gce
Here are 151 public repositories matching this topic...
I don't find mention of how to install plugins in the README or the docs linked from there.
Assuming most new nixops users are going to want to try nixops with libvirtd or VirtualBox, this is a significant adoption blocker.
As per our discussion, after having curled the latest version of kn and run kn apply in an already existing working directory (hence previously initialized with an older version of kn), I am getting this error:
/opt/KubeNow/bin/ssh-agent-wrapper: line 7: kn-apply: command not found
By running ls bin in the working folder I noticed that the command kn-apply does not exist. This is becau
-
Updated
Mar 27, 2020 - Go
-
Updated
Apr 19, 2020 - Shell
I have looked everywhere through Fog documentation, CarrierWave, etc. and no documentation seems to show the correct process for using CarrierWave/Fog with Cloud Storage using a service account (JSON credentials).
This issue talks about issues with using a service account, but gives no solution. It's also 3 years old.
The [Fog website](http://
Environment details
- OS: Debian 8
- Node.js version: 8.16.2
- npm version: 6.4.1
@google-cloud/computeversion: 1.1.8
Steps to reproduce
-
Create a VM using
gce.zone("zone").createVM(name)in a zone that doesn't have enough resources to launch the VM. This step succeeds and returns a vm withstatus: "RUNNING". -
Call
vm.waitFor("RUNNING")on that i
Hi,
I managed to get this to run. Thanks so much for all your work.
The disk management section of the documentation would be nice to be filled in.
At the moment I am struggling to understand where my setup information is stored, as I need to rerun setup every time I open the console.
But it does reuse the snapshot and the game disk.
Happy to help out with the docs if you want to just giv
We want to add support for AzureStack, Microsoft's hybrid cloud. However the documentation in the Wiki on doing this is not clear. Also, all the comments are TBD for each cloud operation.
-
Updated
Jun 6, 2019 - HCL
-
Updated
Mar 19, 2020 - PHP
GCP does not have a direct analogue to firewalls/security group. A firewall resource in GCP is closer to a firewall rule in other providers. Therefore, the current implementation simulates groups of rules by a complicated procedure of tagging.
However, this complicates the code greatly, and has a significant impact on performance, since firewall rules must be repeatedly queried and grouped by t
-
Updated
Jan 3, 2019 - Shell
Operations like create() and terminate() block execution until completed. There should be a way of polling for state changes as we do with EC2. Not sure if there is a precedent for this in libcloud or if we would have to abandon libcloud.
-
Updated
Jan 17, 2019 - Go
-
Updated
Sep 8, 2019 - Makefile
-
Updated
Feb 11, 2019 - Shell
-
Updated
Aug 10, 2017 - Jupyter Notebook
-
Updated
May 6, 2020 - Python
From https://cloud.google.com/vpc/docs/add-remove-network-tags#source_filters_for_ingress_firewall_rules:
When you use an ingress firewall rule with source tags, you might observe a propagation delay. This delay is typically a few seconds, but it can be, in rare cases, a few minutes. When you make the following changes, the ingress firewall rule can take time to apply to or be removed from an
-
Updated
Jun 6, 2020 - JavaScript
-
Updated
Feb 22, 2018 - Shell
-
Updated
Jun 5, 2019 - HCL
-
Updated
May 1, 2019 - Shell
Improve this page
Add a description, image, and links to the gce topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the gce topic, visit your repo's landing page and select "manage topics."

What would you like to be added:
Enable Dynamic Persistent volume Provisioning for ceph rbd provisioner through adding "allowVolumeExpansion" parameter.
Why is this needed:
Dynamic Persistent volume Provisioning is necessary and ceph rbd support this.