frigo
frigo
I see CvpApi provides a create_change_control method that works for older version of the API, that uses the documented /changeControl/addOrUpdateChangeControl.do service However for newer versions of the API we should...
Using latest goarista from master branch, EOS 4.27.4M, and a configuration like this: ``` metrics: - name: ocprometheus_bgp_peer_as_number #No unit path: /Sysdb/routing/bgp/export/vrfBgpPeerInfoStatusEntryTable/(?P.+)/bgpPeerInfoStatusEntry/(?P.+)/bgpPeerAs help: BGP Peer AS Number ``` ocprometheus fails...
### Container platform OCP 4 ### Version quay.io/sclorg/postgresql-15-c9s:latest from awx-operator ### OS version of the container image CentOS Stream 9 ### Bugzilla, Jira _No response_ ### Description this image runs...
### Bug report criteria - [X] This bug report is not security related, security issues should be disclosed privately via [etcd maintainers](mailto:[email protected]). - [X] This is not a support request...
Using this task: ``` - name: configure ipv4 dhcp fixed address based on existing lease nios_fixed_address: name: "{{ilo}}" ipaddr: "{{ lease.address }}" mac: "{{ lease.hardware }}" network: "{{lease.network }}" network_view:...
Tasks like nios_fixed_address (and maybe others) support a check mode to check for difference, but do not actually display the change. It would be great to be able to register...
## Describe the bug PANOS_LOGGING environment variable does not support osx_curl ## Expected behavior it should be possible to activate osx_curl logging with ```PANOS_LOGGING=osx_curl``` ## Current behavior ``` Error: Unknown...
when updating a large security rule group, one action=move API call is made for each rule of the security rule group, the first rule is placed according to the group...
Define CKD_SHA256_KDF transformation to be used with CKM_ECDH1_DERIVE. Some HSM with FIPS restriction will refuse to derive keys with CKD_NULL. CKD_SHA256_KDF will do fine though. Unfortunately this is not implemented...
It's not possible to provide data to az keyvault key sign and verify as found in https://github.com/Azure/azure-cli/issues/27631, https://github.com/Azure/azure-cli/issues/28027 We now allow for valid base64 data to be given as digest....