Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...est. There are two reasons to use a phony target: to avoid a conflict with a file of the same name, and to improve performance. If you write a rule whose recipe will not create the target file, the recipe will be execu
    1 KB (197 words) - 15:31, 21 March 2020
  • Helm has fairly simple architecture, which is comprised of a client and an in-cluster server. ...etes application through a component called Tiller Server installed within a Kubernetes cluster. Tiller interacts with the Kubernetes API server to inst
    1 KB (217 words) - 08:13, 22 August 2019
  • ...can only increase or be reset to zero on restart. For example, you can use a counter to represent the number of requests served, tasks completed, or err ...use a counter for the number of currently running processes; instead, use a gauge.
    2 KB (299 words) - 17:35, 11 March 2021
  • ...lplan application, as well as other resources in Asterisk. Channels not in a Stasis application generally cannot be manipulated by ARI - the purpose of Resources in Asterisk do not, by default, send events about themselves to a connected ARI application. In order to get events about resources, one of t
    2 KB (288 words) - 21:21, 13 July 2020
  • == Write a list ==
    801 bytes (17 words) - 12:02, 31 May 2017
  • database query -- Run a user-specified query on the astdb Retrieves an entry in the Asterisk database for a given
    1 KB (143 words) - 14:13, 4 March 2017
  • - '3pcc-C-A' : Controller A side (must be started after all other 3pcc - '3pcc-A' : A side.
    1 KB (142 words) - 13:53, 24 January 2020
  • ...an be understood as 'a group of instructions into a context'. A context is a named collection of extensions. ...ss:port couple. So, let's say the address:port couple is the enter gate to a specific profile. Once the call has entered the profile, first thing Freesw
    2 KB (407 words) - 15:48, 8 January 2021
  • ...ne: No pause. Use none to remove a normally occurring pause, such as after a period. : weak: Sets a pause of the same duration as the pause after a comma.
    2 KB (272 words) - 15:53, 25 June 2019
  • == Piping core dump to a program ==
    736 bytes (59 words) - 11:27, 12 November 2018
  • ...emented for an ACK, but the CSeq method is changed to ACK. This is so that a UAS can match the CSeq number of the ACK with the number of the correspondi ...dify a media description that has already been sent in the initial INVITE; a re-INVITE or UPDATE must be used for this purpose. SDP in an ACK is used in
    2 KB (415 words) - 16:17, 3 February 2020
  • * Ctrl+a c : screen에서 새창 띄우기 * Ctrl+a a : 바로 전 창으로
    2 KB (106 words) - 08:42, 25 July 2016
  • REFER is used for call transfer in SIP. The asterisk gets a REFER to place a new call with an INVITE somewhere and then keep the transferer up-to-date o ...sent outside or inside of a dialog. Asterisk only accepts REFER inside of a dialog.
    3 KB (432 words) - 10:32, 9 January 2017
  • ; Define ackcall to require the agent to give a DTMF acknowledgement ; when the agent receives a call.
    2 KB (304 words) - 09:22, 5 December 2016
  • ...elf-contained way for securely transmitting information between parties as a JSON object, and they are commonly used by developers in their APIs. JWTs a : A JWT is stateless. That is, it does not need to be stored in the database(pe
    3 KB (556 words) - 04:28, 3 June 2020
  • swapon -a [-e] [-f] [-v] swapoff -a [-v]
    358 bytes (48 words) - 08:41, 25 July 2016
  • FRR(FRRouting) is a fully-featured, high performance, free software for IP routing suite. FRR is a fully-featured, high performance, free software IP routing suite.
    240 bytes (30 words) - 08:17, 15 December 2020
  • Kustomize is a tool for customizing Kubernetes configurations. It has the following featur Kustomize is a standalone tool to customize Kubernetes objects through a kustomization file.
    2 KB (315 words) - 01:12, 21 December 2020
  • Reference to request's URI(address in the first line of a SIP request). It is R/W variable(you can assign values to it directly in co Reference to username in request's URI or to the Namespace Identifier of a URN(See RFC 2141).
    2 KB (277 words) - 15:56, 6 August 2019
  • ...from one Pod to another Pod. A cluster that uses alias IP ranges is called a VPC-native cluster.
    518 bytes (57 words) - 12:39, 5 March 2020
  • ;add_newline = no ; Append a newline to every event. This is ; useful if you want to run a fake statsd
    468 bytes (66 words) - 11:08, 2 November 2017
  • Augular is a framework for building client applications in HTML, CSS, and JavaScript / T * Gives our applications a clean structure.
    2 KB (189 words) - 14:22, 16 February 2018
  • logger add channel -- Adds a new logging channel logger mute -- Toggle logging output to a console
    1 KB (155 words) - 13:27, 10 October 2016
  • ...he end user. There is a charge for each CNAM database "dip" of around half a cent that goes from the telco that does the lookup to the telco that regist ...the number, and is passed through to end receiving party with no need for a lookup by the receiving carrier.
    2 KB (339 words) - 08:26, 2 December 2019
  • ...on performs routing of SIP requests which contain a route set. The name is a little bit confusing, as this function also routes requests which are in th ...ike ACK, BYE, reINVITE). Nevertheless also out-of-dialog requests can have a "pre-loaded route set" and maybe routed with with loose_route. It also take
    2 KB (320 words) - 21:44, 27 July 2019
  • The overall stasis-core API can be best described as a publish/subscribe message bus. ...ociates the message data(which is simply an AO2 managed void *) along with a stasis_message_type. (The message also has the timeval when it was created,
    4 KB (648 words) - 20:12, 11 April 2019
  • devstate change -- Change a custom device state Change a custom device to a new state.
    1 KB (153 words) - 09:16, 18 October 2016
  • ...rite an MIF file for a fax/modem that contains two groups: a fax group and a modem group. Some group attributes include warranty information, support ph ...it is designed not to use a lot of memory. The service layer also includes a common interface called the local agent, which is used to manage individual
    3 KB (365 words) - 08:07, 8 August 2016
  • ...ef>http://stackoverflow.com/questions/18693159/eclipse-this-project-is-not-a-cdt-project</ref> Click File->New->Convert to a C/C++ project
    754 bytes (54 words) - 08:55, 25 July 2016
  • ...between the channels, as well as to play media to the various channels in a variety of ways. ...channels in the bridge, a mixing bridge may attempt to share the media in a variety of ways.
    4 KB (701 words) - 21:11, 12 July 2020
  • tmp_const = ",\",I like a,\"\" Super mario."; str[,",I like a,"" Super mario.], len[27]
    973 bytes (137 words) - 14:25, 23 June 2016
  • LRN(Location Routing Number) is an identification for a telephone switch for the purpose of routing telephone calls through the PST ...numbers are routed based on the NPA-NXX of the number's associated LRN. If a customer ports their number to another provider, the current telephone numb
    979 bytes (150 words) - 08:06, 8 July 2020
  • ...The application to run is specified as the first argument to AGI(). Unless a full path is specified, the application is expected to exist in the /var/li ...n addtion to the communication on stdin and stdout, Asterisk also provides a unidirectional stream of audio coming from the channel on file descriptor 3
    4 KB (652 words) - 14:12, 20 January 2018
  • ...rtpproxy module using a new control protocol. The module is designed to be a drop in it only works with RTP proxies which specifically support it. Definition of socket(s) used to connect to (a set) RTP proxy. It may specify a UNIX socket or an IPv4/IPv6 UDP socket.
    4 KB (575 words) - 11:17, 31 May 2020
  • ...ilities to determine applicable internet servers responsible for servicing a given telephone number using DNS queries.
    743 bytes (98 words) - 15:04, 6 July 2020
  • $ sudo usermod -a -G wireshark $USER $ sudo usermod -a -G wireshark YOUR_USER_NAME
    2 KB (164 words) - 12:00, 27 July 2016
  • To start let's put together a simple example flow that we can use as a base for testing out the different layouting options.
    642 bytes (99 words) - 08:04, 6 March 2024
  • where Xxx does not start with a lowercase letter. The function name serves to identify the test routine. To write a new test suite, create a file whose name ends _test.go that contains the TestXxx functions are descr
    4 KB (605 words) - 17:37, 2 August 2021
  • ...ode (e.g. "code=202" would accept 202 as an additional, valid response) or a class of responses, you want to accept(e.g. "class=2" would accept everythi ...even if it is, because internally the Kamailio transactio layer generates a 408 in the case of no response from the remote server, and this internal co
    2 KB (251 words) - 22:03, 28 August 2020
  • ...roduced based on the state of the channels and bridges within Asterisk. As a result, there is much greater degree of consistency in CDRs throughout Aste ...on how channels are dialed and bridged, multiple CDRs will be created for a given call. Post-processing of these records will be required to determine
    8 KB (1,432 words) - 09:40, 23 September 2019
  • Let A be an array of Boolean values, indexed by integers 2 to n, if A[i] is true:
    2 KB (242 words) - 07:22, 8 August 2016
  • ...ingress controller is responsible for fulfilling the ingress, usually with a load balancer, though it may also configure your edge router or additional ...Exposing services other than HTTP and HTTPS to the internet typically uses a service of type Service.Type=NodePort or Service.Type=LoadBalancer.
    887 bytes (124 words) - 08:36, 27 March 2020
  • ...st be sent N-1 times over an uplink to the N-1 participants. This requires a significant amount of uplink bandwidth from participants. Furthermore, there is also a significant computational cost for each client device, as it must encode th
    3 KB (392 words) - 12:53, 27 July 2020
  • media cache show -- Show a single item in the media cache a local media file with some URI.
    923 bytes (106 words) - 21:06, 16 October 2018
  • Digging a bit deeper, a Pod is a shared execution environment for one or more contrainers. Quite often it's
    1 KB (177 words) - 00:13, 9 January 2020
  • dialplan remove context -- Remove a specified context dialplan remove extension -- Remove a specified extension
    3 KB (315 words) - 09:16, 12 October 2016
  • $n These variables correspond to the arguments with which a script was invoked. Here n is a positive decimal number corresponding to the position of an argument (the f
    4 KB (511 words) - 15:45, 15 October 2018
  • channel originate Originate a call channel redirect Redirect a call
    4 KB (458 words) - 10:24, 28 February 2019
  • * branch_route: the function returns true if a branch route is set to be executed. * failure_route: the function returns true if a failure route is set to be executed.
    4 KB (620 words) - 10:57, 18 March 2020
  • # "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not # ban a host which matches an address in this list. Several addresses can be
    2 KB (170 words) - 08:38, 25 July 2016

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)