Displaying 8 results from an estimated 8 matches for "af8d".
Did you mean:
af87
2014 Oct 05
1
Re: Assigning IPv6 address to guest
...he server)
>
> Example in my case is pasted (there are 4 machines):
>
> $ ping6 -I n1 ff02::1
> PING ff02::1(ff02::1) from fe80::2c3b:53ff:fea0:9d26 n1: 56 data bytes
> 64 bytes from fe80::2c3b:53ff:fea0:9d26: icmp_seq=1 ttl=64 time=0.099 ms
> 64 bytes from fe80::c4a2:78ff:fe7d:af8d: icmp_seq=1 ttl=64 time=0.590 ms
> (DUP!)
> 64 bytes from fe80::5054:ff:fe12:3456: icmp_seq=1 ttl=64 time=0.967 ms
> (DUP!)
> 64 bytes from fe80::5054:ff:fe12:3457: icmp_seq=1 ttl=64 time=2.10 ms (DUP!)
> 64 bytes from fe80::2c3b:53ff:fea0:9d26: icmp_seq=2 ttl=64 time=0.097 ms
> 6...
2014 Oct 04
2
Re: Assigning IPv6 address to guest
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 10/4/2014 8:46 PM, Bhasker C V wrote:
> On 04/10/14 15:36, The Cop wrote:
>> Hello,
>>
>> I am trying to assign an IPv6 address to one of my guests. I followed the
>> following guide, unsuccessfully:
>>
https://www.berrange.com/posts/2011/06/16/providing-ipv6-connectivity-to-virtual-guests-with-libvirt-and-kvm/
2014 Oct 04
0
Re: Assigning IPv6 address to guest
...and the other is
the address on the server)
Example in my case is pasted (there are 4 machines):
$ ping6 -I n1 ff02::1
PING ff02::1(ff02::1) from fe80::2c3b:53ff:fea0:9d26 n1: 56 data bytes
64 bytes from fe80::2c3b:53ff:fea0:9d26: icmp_seq=1 ttl=64 time=0.099 ms
64 bytes from fe80::c4a2:78ff:fe7d:af8d: icmp_seq=1 ttl=64 time=0.590 ms
(DUP!)
64 bytes from fe80::5054:ff:fe12:3456: icmp_seq=1 ttl=64 time=0.967 ms
(DUP!)
64 bytes from fe80::5054:ff:fe12:3457: icmp_seq=1 ttl=64 time=2.10 ms (DUP!)
64 bytes from fe80::2c3b:53ff:fea0:9d26: icmp_seq=2 ttl=64 time=0.097 ms
64 bytes from fe80::c4a2:78ff:f...
2020 Jan 02
2
u2f seed
...ot; Weisgerber naddy at mips.inka.de
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev at mindrot.org
https://protect2.fireeye.com/v1/url?k=c4371812-988227ab-c4373207-0cc47adc5fce-56c2948a65834232&q=1&e=0f45e6c0-4544-44ae-af8d-3d64af881ea7&u=https%3A%2F%2Flists.mindrot.org%2Fmailman%2Flistinfo%2Fopenssh-unix-dev
2020 Jan 02
4
u2f seed
In the u2f protocol, my understanding is in the normal case, the web browser seeds the keypair process with the hostname of the remote server. In the case of ssh, the hostname is probably not what I would want to do. But the u2f protocol seems to have a way to handle this. It just needs to be exposed to the user. The content of the private keyfile in ssh is generated somehow. Where is that done?
2017 Oct 26
0
not healing one file
Hey Richard,
Could you share the following informations please?
1. gluster volume info <volname>
2. getfattr output of that file from all the bricks
getfattr -d -e hex -m . <brickpath/filepath>
3. glustershd & glfsheal logs
Regards,
Karthik
On Thu, Oct 26, 2017 at 10:21 AM, Amar Tumballi <atumball at redhat.com> wrote:
> On a side note, try recently released health
2017 Oct 26
3
not healing one file
On a side note, try recently released health report tool, and see if it
does diagnose any issues in setup. Currently you may have to run it in all
the three machines.
On 26-Oct-2017 6:50 AM, "Amar Tumballi" <atumball at redhat.com> wrote:
> Thanks for this report. This week many of the developers are at Gluster
> Summit in Prague, will be checking this and respond next
2017 Oct 26
2
not healing one file
...n.c:1327:afr_log_selfheal] 0-home-replicate-0: Completed metadata selfheal on 5faad677-a39d-42bb-8b46-1b0d0e888bf7. sources=0 [2] sinks=1
[2017-10-25 10:40:23.317699] I [MSGID: 108026] [afr-self-heal-common.c:1327:afr_log_selfheal] 0-home-replicate-0: Completed data selfheal on ab37461d-fbba-4c39-af8d-bf4e9aa754f4. sources=0 [2] sinks=1
[2017-10-25 10:40:23.319894] I [MSGID: 108026] [afr-self-heal-metadata.c:52:__afr_selfheal_metadata_do] 0-home-replicate-0: performing metadata selfheal on ab37461d-fbba-4c39-af8d-bf4e9aa754f4
[2017-10-25 10:40:23.323962] I [MSGID: 108026] [afr-self-heal-common...