+ PMCs
On Wed, 17 May 2023 at 14:27, Rohit Yadav wrote:
>
> All,
>
> The ASF-infra had announced a hard deadline [0][1] to decommission our
> project’s Roller based blog [3] on the 31st May 2023.
>
> For the blog migration, ASF-infra has exported CloudStack blog posts
> from the current Roller’s
+1 (binding), good plan knowing the short deadline.
On 2023/05/17 08:57:40 Rohit Yadav wrote:
> All,
>
> The ASF-infra had announced a hard deadline [0][1] to decommission our
> project’s Roller based blog [3] on the 31st May 2023.
>
> For the blog migration, ASF-infra has exported CloudStack b
+1 (binding)
Great job @Rohit Yadav
-Wei
On Wed, 17 May 2023 at 10:58, Rohit Yadav wrote:
> All,
>
> The ASF-infra had announced a hard deadline [0][1] to decommission our
> project’s Roller based blog [3] on the 31st May 2023.
>
> For the blog migration, ASF-infra has exported CloudStack b
Thank you everyone, for your responses.
I feel the need to further clarify my question:
The spoofing and IP theft this thread is concerned with is related to bad
actors on cloudstack instances attempting to send out traffic as a
different IP or attempting to utilize network IPs that aren't/weren't
Hi Will,
What type of zone and network do you use ?
As said before, the functionality works in the Advanced zones with security
groups (as well as the Basic zones).
If you use the advanced zone and isolated networks (it seems so), there is
no such functionality, as far as I know.
-Wei
On Mon,
Hi Wei,
Thanks for your response. Advanced zone is being used with a guest network
type "shared". Disclaimer, I neither setup nor configured this
cloustack zone or instance. How can I tell if security groups were enabled
when the zone was created? At this point, I am leaning towards they
weren't,