Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...est. There are two reasons to use a phony target: to avoid a conflict with a file of the same name, and to improve performance. If you write a rule whose recipe will not create the target file, the recipe will be execu
    1 KB (197 words) - 15:31, 21 March 2020
  • Helm has fairly simple architecture, which is comprised of a client and an in-cluster server. ...etes application through a component called Tiller Server installed within a Kubernetes cluster. Tiller interacts with the Kubernetes API server to inst
    1 KB (217 words) - 08:13, 22 August 2019
  • ...can only increase or be reset to zero on restart. For example, you can use a counter to represent the number of requests served, tasks completed, or err ...use a counter for the number of currently running processes; instead, use a gauge.
    2 KB (299 words) - 17:35, 11 March 2021
  • ...lplan application, as well as other resources in Asterisk. Channels not in a Stasis application generally cannot be manipulated by ARI - the purpose of Resources in Asterisk do not, by default, send events about themselves to a connected ARI application. In order to get events about resources, one of t
    2 KB (288 words) - 21:21, 13 July 2020
  • == Write a list ==
    801 bytes (17 words) - 12:02, 31 May 2017
  • database query -- Run a user-specified query on the astdb Retrieves an entry in the Asterisk database for a given
    1 KB (143 words) - 14:13, 4 March 2017
  • - '3pcc-C-A' : Controller A side (must be started after all other 3pcc - '3pcc-A' : A side.
    1 KB (142 words) - 13:53, 24 January 2020
  • ...an be understood as 'a group of instructions into a context'. A context is a named collection of extensions. ...ss:port couple. So, let's say the address:port couple is the enter gate to a specific profile. Once the call has entered the profile, first thing Freesw
    2 KB (407 words) - 15:48, 8 January 2021
  • ...ne: No pause. Use none to remove a normally occurring pause, such as after a period. : weak: Sets a pause of the same duration as the pause after a comma.
    2 KB (272 words) - 15:53, 25 June 2019
  • == Piping core dump to a program ==
    736 bytes (59 words) - 11:27, 12 November 2018
  • ...emented for an ACK, but the CSeq method is changed to ACK. This is so that a UAS can match the CSeq number of the ACK with the number of the correspondi ...dify a media description that has already been sent in the initial INVITE; a re-INVITE or UPDATE must be used for this purpose. SDP in an ACK is used in
    2 KB (415 words) - 16:17, 3 February 2020
  • * Ctrl+a c : screen에서 새창 띄우기 * Ctrl+a a : 바로 전 창으로
    2 KB (106 words) - 08:42, 25 July 2016
  • REFER is used for call transfer in SIP. The asterisk gets a REFER to place a new call with an INVITE somewhere and then keep the transferer up-to-date o ...sent outside or inside of a dialog. Asterisk only accepts REFER inside of a dialog.
    3 KB (432 words) - 10:32, 9 January 2017
  • ; Define ackcall to require the agent to give a DTMF acknowledgement ; when the agent receives a call.
    2 KB (304 words) - 09:22, 5 December 2016
  • ...elf-contained way for securely transmitting information between parties as a JSON object, and they are commonly used by developers in their APIs. JWTs a : A JWT is stateless. That is, it does not need to be stored in the database(pe
    3 KB (556 words) - 04:28, 3 June 2020
  • swapon -a [-e] [-f] [-v] swapoff -a [-v]
    358 bytes (48 words) - 08:41, 25 July 2016
  • FRR(FRRouting) is a fully-featured, high performance, free software for IP routing suite. FRR is a fully-featured, high performance, free software IP routing suite.
    240 bytes (30 words) - 08:17, 15 December 2020
  • Kustomize is a tool for customizing Kubernetes configurations. It has the following featur Kustomize is a standalone tool to customize Kubernetes objects through a kustomization file.
    2 KB (315 words) - 01:12, 21 December 2020
  • Reference to request's URI(address in the first line of a SIP request). It is R/W variable(you can assign values to it directly in co Reference to username in request's URI or to the Namespace Identifier of a URN(See RFC 2141).
    2 KB (277 words) - 15:56, 6 August 2019
  • ...from one Pod to another Pod. A cluster that uses alias IP ranges is called a VPC-native cluster.
    518 bytes (57 words) - 12:39, 5 March 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)