Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...est. There are two reasons to use a phony target: to avoid a conflict with a file of the same name, and to improve performance. If you write a rule whose recipe will not create the target file, the recipe will be execu
    1 KB (197 words) - 15:31, 21 March 2020
  • Helm has fairly simple architecture, which is comprised of a client and an in-cluster server. ...etes application through a component called Tiller Server installed within a Kubernetes cluster. Tiller interacts with the Kubernetes API server to inst
    1 KB (217 words) - 08:13, 22 August 2019
  • ...can only increase or be reset to zero on restart. For example, you can use a counter to represent the number of requests served, tasks completed, or err ...use a counter for the number of currently running processes; instead, use a gauge.
    2 KB (299 words) - 17:35, 11 March 2021
  • ...lplan application, as well as other resources in Asterisk. Channels not in a Stasis application generally cannot be manipulated by ARI - the purpose of Resources in Asterisk do not, by default, send events about themselves to a connected ARI application. In order to get events about resources, one of t
    2 KB (288 words) - 21:21, 13 July 2020
  • == Write a list ==
    801 bytes (17 words) - 12:02, 31 May 2017
  • database query -- Run a user-specified query on the astdb Retrieves an entry in the Asterisk database for a given
    1 KB (143 words) - 14:13, 4 March 2017
  • - '3pcc-C-A' : Controller A side (must be started after all other 3pcc - '3pcc-A' : A side.
    1 KB (142 words) - 13:53, 24 January 2020
  • ...an be understood as 'a group of instructions into a context'. A context is a named collection of extensions. ...ss:port couple. So, let's say the address:port couple is the enter gate to a specific profile. Once the call has entered the profile, first thing Freesw
    2 KB (407 words) - 15:48, 8 January 2021
  • ...ne: No pause. Use none to remove a normally occurring pause, such as after a period. : weak: Sets a pause of the same duration as the pause after a comma.
    2 KB (272 words) - 15:53, 25 June 2019
  • == Piping core dump to a program ==
    736 bytes (59 words) - 11:27, 12 November 2018
  • ...emented for an ACK, but the CSeq method is changed to ACK. This is so that a UAS can match the CSeq number of the ACK with the number of the correspondi ...dify a media description that has already been sent in the initial INVITE; a re-INVITE or UPDATE must be used for this purpose. SDP in an ACK is used in
    2 KB (415 words) - 16:17, 3 February 2020
  • * Ctrl+a c : screen에서 새창 띄우기 * Ctrl+a a : 바로 전 창으로
    2 KB (106 words) - 08:42, 25 July 2016
  • REFER is used for call transfer in SIP. The asterisk gets a REFER to place a new call with an INVITE somewhere and then keep the transferer up-to-date o ...sent outside or inside of a dialog. Asterisk only accepts REFER inside of a dialog.
    3 KB (432 words) - 10:32, 9 January 2017
  • ; Define ackcall to require the agent to give a DTMF acknowledgement ; when the agent receives a call.
    2 KB (304 words) - 09:22, 5 December 2016
  • ...elf-contained way for securely transmitting information between parties as a JSON object, and they are commonly used by developers in their APIs. JWTs a : A JWT is stateless. That is, it does not need to be stored in the database(pe
    3 KB (556 words) - 04:28, 3 June 2020
  • swapon -a [-e] [-f] [-v] swapoff -a [-v]
    358 bytes (48 words) - 08:41, 25 July 2016
  • FRR(FRRouting) is a fully-featured, high performance, free software for IP routing suite. FRR is a fully-featured, high performance, free software IP routing suite.
    240 bytes (30 words) - 08:17, 15 December 2020
  • Kustomize is a tool for customizing Kubernetes configurations. It has the following featur Kustomize is a standalone tool to customize Kubernetes objects through a kustomization file.
    2 KB (315 words) - 01:12, 21 December 2020
  • Reference to request's URI(address in the first line of a SIP request). It is R/W variable(you can assign values to it directly in co Reference to username in request's URI or to the Namespace Identifier of a URN(See RFC 2141).
    2 KB (277 words) - 15:56, 6 August 2019
  • ...from one Pod to another Pod. A cluster that uses alias IP ranges is called a VPC-native cluster.
    518 bytes (57 words) - 12:39, 5 March 2020
  • ;add_newline = no ; Append a newline to every event. This is ; useful if you want to run a fake statsd
    468 bytes (66 words) - 11:08, 2 November 2017
  • Augular is a framework for building client applications in HTML, CSS, and JavaScript / T * Gives our applications a clean structure.
    2 KB (189 words) - 14:22, 16 February 2018
  • logger add channel -- Adds a new logging channel logger mute -- Toggle logging output to a console
    1 KB (155 words) - 13:27, 10 October 2016
  • ...he end user. There is a charge for each CNAM database "dip" of around half a cent that goes from the telco that does the lookup to the telco that regist ...the number, and is passed through to end receiving party with no need for a lookup by the receiving carrier.
    2 KB (339 words) - 08:26, 2 December 2019
  • ...on performs routing of SIP requests which contain a route set. The name is a little bit confusing, as this function also routes requests which are in th ...ike ACK, BYE, reINVITE). Nevertheless also out-of-dialog requests can have a "pre-loaded route set" and maybe routed with with loose_route. It also take
    2 KB (320 words) - 21:44, 27 July 2019
  • The overall stasis-core API can be best described as a publish/subscribe message bus. ...ociates the message data(which is simply an AO2 managed void *) along with a stasis_message_type. (The message also has the timeval when it was created,
    4 KB (648 words) - 20:12, 11 April 2019
  • devstate change -- Change a custom device state Change a custom device to a new state.
    1 KB (153 words) - 09:16, 18 October 2016
  • ...rite an MIF file for a fax/modem that contains two groups: a fax group and a modem group. Some group attributes include warranty information, support ph ...it is designed not to use a lot of memory. The service layer also includes a common interface called the local agent, which is used to manage individual
    3 KB (365 words) - 08:07, 8 August 2016
  • ...ef>http://stackoverflow.com/questions/18693159/eclipse-this-project-is-not-a-cdt-project</ref> Click File->New->Convert to a C/C++ project
    754 bytes (54 words) - 08:55, 25 July 2016
  • ...between the channels, as well as to play media to the various channels in a variety of ways. ...channels in the bridge, a mixing bridge may attempt to share the media in a variety of ways.
    4 KB (701 words) - 21:11, 12 July 2020
  • tmp_const = ",\",I like a,\"\" Super mario."; str[,",I like a,"" Super mario.], len[27]
    973 bytes (137 words) - 14:25, 23 June 2016
  • LRN(Location Routing Number) is an identification for a telephone switch for the purpose of routing telephone calls through the PST ...numbers are routed based on the NPA-NXX of the number's associated LRN. If a customer ports their number to another provider, the current telephone numb
    979 bytes (150 words) - 08:06, 8 July 2020
  • ...The application to run is specified as the first argument to AGI(). Unless a full path is specified, the application is expected to exist in the /var/li ...n addtion to the communication on stdin and stdout, Asterisk also provides a unidirectional stream of audio coming from the channel on file descriptor 3
    4 KB (652 words) - 14:12, 20 January 2018
  • ...rtpproxy module using a new control protocol. The module is designed to be a drop in it only works with RTP proxies which specifically support it. Definition of socket(s) used to connect to (a set) RTP proxy. It may specify a UNIX socket or an IPv4/IPv6 UDP socket.
    4 KB (575 words) - 11:17, 31 May 2020
  • ...ilities to determine applicable internet servers responsible for servicing a given telephone number using DNS queries.
    743 bytes (98 words) - 15:04, 6 July 2020
  • $ sudo usermod -a -G wireshark $USER $ sudo usermod -a -G wireshark YOUR_USER_NAME
    2 KB (164 words) - 12:00, 27 July 2016
  • To start let's put together a simple example flow that we can use as a base for testing out the different layouting options.
    642 bytes (99 words) - 08:04, 6 March 2024
  • where Xxx does not start with a lowercase letter. The function name serves to identify the test routine. To write a new test suite, create a file whose name ends _test.go that contains the TestXxx functions are descr
    4 KB (605 words) - 17:37, 2 August 2021
  • ...ode (e.g. "code=202" would accept 202 as an additional, valid response) or a class of responses, you want to accept(e.g. "class=2" would accept everythi ...even if it is, because internally the Kamailio transactio layer generates a 408 in the case of no response from the remote server, and this internal co
    2 KB (251 words) - 22:03, 28 August 2020
  • ...roduced based on the state of the channels and bridges within Asterisk. As a result, there is much greater degree of consistency in CDRs throughout Aste ...on how channels are dialed and bridged, multiple CDRs will be created for a given call. Post-processing of these records will be required to determine
    8 KB (1,432 words) - 09:40, 23 September 2019
  • Let A be an array of Boolean values, indexed by integers 2 to n, if A[i] is true:
    2 KB (242 words) - 07:22, 8 August 2016
  • ...ingress controller is responsible for fulfilling the ingress, usually with a load balancer, though it may also configure your edge router or additional ...Exposing services other than HTTP and HTTPS to the internet typically uses a service of type Service.Type=NodePort or Service.Type=LoadBalancer.
    887 bytes (124 words) - 08:36, 27 March 2020
  • ...st be sent N-1 times over an uplink to the N-1 participants. This requires a significant amount of uplink bandwidth from participants. Furthermore, there is also a significant computational cost for each client device, as it must encode th
    3 KB (392 words) - 12:53, 27 July 2020
  • media cache show -- Show a single item in the media cache a local media file with some URI.
    923 bytes (106 words) - 21:06, 16 October 2018
  • Digging a bit deeper, a Pod is a shared execution environment for one or more contrainers. Quite often it's
    1 KB (177 words) - 00:13, 9 January 2020
  • dialplan remove context -- Remove a specified context dialplan remove extension -- Remove a specified extension
    3 KB (315 words) - 09:16, 12 October 2016
  • $n These variables correspond to the arguments with which a script was invoked. Here n is a positive decimal number corresponding to the position of an argument (the f
    4 KB (511 words) - 15:45, 15 October 2018
  • channel originate Originate a call channel redirect Redirect a call
    4 KB (458 words) - 10:24, 28 February 2019
  • * branch_route: the function returns true if a branch route is set to be executed. * failure_route: the function returns true if a failure route is set to be executed.
    4 KB (620 words) - 10:57, 18 March 2020
  • # "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not # ban a host which matches an address in this list. Several addresses can be
    2 KB (170 words) - 08:38, 25 July 2016
  • Reload a previously imported module. The argument must be a module object, so it must have been successfully imported before. This is u ...module’s dictionary. The init function of extension modules is not called a second time.
    4 KB (577 words) - 08:31, 10 October 2017
  • allocs: A sampling of all past memory allocations heap: A sampling of memory allocations of live objects. You can specify the gc GET
    1 KB (179 words) - 07:03, 21 September 2021
  • Kamailio can behave as a stateful proxy through the TM module. However, "stateful" in this context r For example, a common need is to limit the number of calls that can be made concurrently b
    5 KB (802 words) - 20:16, 29 July 2019
  • ...ed calling numbers since 2014. The industry's response has been to develop a new technology standard called STIR(Secure Telephony Identity Revisited) an ...ms, each telephone service provider obtains their digital certificate from a certificate authority who is trusted by other telephone service providers.
    5 KB (681 words) - 14:39, 2 August 2023
  • ...ed to refer to the tree. Some of the macros in tree.h require this name as a parameter. ...custom structure to store our data. It must contain an `entry' member with a type of RB_ENTRY(StrListNode). The name that you choose for the `entry' mem
    5 KB (715 words) - 08:33, 5 November 2015
  • : A faster but less precise version of CLOCK_REALTIME. Use when you need very : A faster but less precise version of CLOCK_MONOTONIC. Use when you need very
    2 KB (298 words) - 08:04, 8 August 2016
  • A StatsD datagram, which contains a single metric, has the following format. : The value is a number that is associated with the metric. Values have different meanings d
    5 KB (695 words) - 12:52, 11 January 2019
  • Generate a Constant 1004 Hz tone at 0dbm (mu-law)
    348 bytes (26 words) - 15:59, 16 June 2015
  • graph Create a visual graph of Terraform resources init Initialize a Terraform working directory
    7 KB (942 words) - 08:44, 26 June 2020
  • * Configure numbers by associating a connection. ...Plan Area, commonly called Area Code. "NXX" refers to the three digits of a phone number immediately following the area code, also called the "exchange
    975 bytes (131 words) - 13:06, 23 November 2020
  • ...le transfer and use a PORT command to request access to ports by posing as a middle man for the file transfer request; then execute port scans on hosts ...ry different password combinations until they can succeed in the break-in. A weak password and repeated use of the same password for multiple FTP server
    4 KB (593 words) - 07:29, 8 August 2016
  • *:8080 is a NameVirtualHost *:8081 is a NameVirtualHost
    2 KB (264 words) - 09:21, 1 August 2016
  • ...k. Request and response payloads are formatted as JSON(although we provide a GET alternative for requests), using UTF-8 encoding and URL encoded values. ...does not. However, when you send a message using a test key, you will get a fake created object back.
    5 KB (772 words) - 09:36, 5 October 2018
  • : list 의 마지막에 item 을 추가한다. a[len(a):] = [x] 와 같다. : L 의 모든 item 을 list 의 마지막에 추가한다. a[len(a):] = L 과 같다.
    5 KB (556 words) - 08:57, 15 November 2016
  • ...rmined by the underlying TLS library(such as OpenSSL). It usually includes a broad range of cipher suites, prioritizing security and compatibility. The ...ion file by setting the 'tls_ciphers' parameter. The cipher list should be a space-separated list of cipher suite names or aliases.
    2 KB (327 words) - 01:43, 26 May 2023
  • React Flow is a React library. That means React developers will feel comfortable using it. == Building a Flow ==
    5 KB (714 words) - 04:14, 6 March 2024
  • ; in these levels being included on filenames that have a level name of "*", ; without any need to perform a 'logger reload' or similar operation).
    3 KB (426 words) - 13:20, 10 October 2016
  • === Execute a dialplan ===
    2 KB (138 words) - 13:36, 19 October 2016
  • <lan-options> := [ -A <authtype> ] <password-option> := [ -f <password_file> | -a | -P <password> | -E ]
    2 KB (207 words) - 07:35, 8 August 2016
  • ...torage buckets as file systems on Linux or macOS systems. It also provides a way for applications to upload and download Cloud Storage objects using sta ...e system operation like mkdir will do the right thing, if the user sets up a bucket's structure using only gcsfuse then user will not notice anything od
    4 KB (557 words) - 06:49, 26 November 2020
  • ...upports definition of many hash tables and can load values at startup from a database table. Lists one value in a hash table.
    3 KB (449 words) - 08:24, 2 August 2019
  • ; parking lot to use as a template to create ; a dynamic parking lot. It is an error to
    11 KB (1,187 words) - 15:08, 20 December 2016
  • ...compute engine instances. Displays all google compute engine instances in a project. ...nstances from all zones are listed. The results can be narrowed down using a filter: --filter="zone:(Zone ...)".
    2 KB (238 words) - 13:03, 30 January 2019
  • * The <MiniMap /> plugin displays a small version of the graph in the corner of the screen. * The <NodeToolbar /> plugin lets you render a toolbar attached to a node.
    7 KB (1,124 words) - 06:18, 5 March 2024
  • -b, --beep beep if command has a non-zero exit -e, --errexit exit if command has a non-zero exit
    2 KB (317 words) - 08:41, 25 July 2016
  • address space are refused. Used for a typical system. It ensures a seriously wild allocation fails while allowing
    3 KB (223 words) - 09:37, 26 June 2017
  • manager show command -- Show a manager interface command manager show event -- Show a manager interface event
    6 KB (668 words) - 10:16, 12 October 2016
  • ...e header. It is supposedly the data previously received from the server in a "Set-Cookie:" line. The data should be in the format "NAME1=VALUE1; NAME2=V The cake is a lie!
    6 KB (862 words) - 08:19, 13 March 2019
  • summary: Delete a key summary: Get the value of a key
    6 KB (614 words) - 20:40, 22 May 2020
  • Decrypt a string encoded in base64 with AES given a 16 character key. Encrypt a string with AES given a 16 character key.
    8 KB (1,229 words) - 19:51, 3 May 2020
  • * recheck: run a jekins build test. * regate: run a jenkins regate test.
    2 KB (264 words) - 08:00, 6 July 2020
  • ...npm is the package manager for Node.js. Ember is build with Node and uses a variety of Node.js modules for operation. The package.json file maintains t ...o our configuration data as the variable config. const is a way to declare a read-only variable to make sure it is not accidentally reaasigned elsewhere
    6 KB (836 words) - 21:59, 5 January 2018
  • === db.collection is not a function === * https://stackoverflow.com/questions/43779323/typeerror-db-collection-is-not-a-function
    626 bytes (68 words) - 14:57, 6 January 2018
  • * Carbon - a Twisted daemon that listens for time-series data. * Whisper - a simple database library for storing time-series data(similar in design to R
    4 KB (314 words) - 10:42, 2 November 2017
  • The WebSocket module in Kamailio implemented a WebSocket(RFC 6455) server and provides connection establishment(handshakin The time(in seconds) after which to send a keep-alive on idle WebSocket connections.
    2 KB (204 words) - 05:51, 21 September 2023
  • This is just a headsup: the disk controller has malfunctioned, and we now only process cal ...customers report problems with web. earth02 is _not_ expected to cope with a full maximum load of calls.
    3 KB (435 words) - 14:27, 16 August 2016
  • RubyGems is a sophisticated package manager for Ruby. This is a gem server present a web page at
    5 KB (464 words) - 08:07, 18 October 2017
  • ...ender form inputs or charts for example. In this section we will implement a node with an input field that updates some text in another part of the appl A custom node is a React component that is wrapped to provide basic functionality like selecti
    9 KB (1,312 words) - 07:35, 6 March 2024
  • ...ne, a PBX, another Asterisk system, or even Asterisk itself(in the case of a local channel)l : Applications and functions can affect the state or attributes of a channel or its media stream.
    9 KB (1,421 words) - 14:16, 6 April 2017
  • ...efault setup a few examples are playing a file, joining a conference, send a call to voicemail, play an IVR menu. Many of common applications are provid : A Dialplan module is responsible for routing calls, based on information such
    5 KB (663 words) - 14:44, 9 December 2020
  • If the dialplan is being built manually, ensure that calls coming in on a trunk execute the SLATrunk() application with an argument of the trunk name For this example, let's say we have a SIP trunk called "mytrunk" that is going to be used as line4. Furthermore,
    8 KB (1,059 words) - 07:32, 2 June 2015
  • Variables within braces must be separated by a comma. ...ridge or originate command to stop remote ringback from being heard by Leg A
    2 KB (195 words) - 11:57, 5 April 2016
  • ..., for example. They can also include telephone numbers. The information in a SIP URL incidates the way in which the resource (user) should be contacted ...IPv4 or IPv6 address followed by an optional ''':''', then port number, or a list of ''';''' separated URI parameters.
    13 KB (2,099 words) - 08:25, 20 April 2023
  • $ sudo smbpasswd -a test_user $ sudo smbpasswd -a notExists
    2 KB (141 words) - 20:11, 7 August 2016
  • ...ed party cannot be reached because, although the called party number is in a valid format, it is not currently allocated (assigned). ...serve the equipment that is sending this cause. This cause is supported on a network dependent basis.
    13 KB (2,036 words) - 12:05, 21 June 2019
  • Generating a 2048 bit RSA private key What you are about to enter is what is called a Distinguished Name or a DN.
    4 KB (346 words) - 13:45, 30 May 2018
  • ;systemname = my_system_name ; Prefix uniqueid with a system name for ;transmit_silence = yes ; Transmit silence while a channel is in a
    6 KB (821 words) - 06:41, 26 November 2020
  • Returns 0 if playback completes without a digit being pressed, or the ASCII numerical value of the digit if one was p * CPLAYBACKSTATUS: Contains the status of the attempt as a text string.
    9 KB (1,207 words) - 13:21, 23 January 2018
  • EISDIR Is a directory (POSIX.1) EISNAM Is a named type file
    7 KB (771 words) - 08:55, 6 September 2016
  • queue add member -- Add a channel to a specified queue queue remove member -- Removes a channel from a specified queue
    7 KB (513 words) - 14:03, 10 August 2017

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)