doc: update description of offline command
Reachability and online/offline mode has no effect on source selection since version 2.0.
This commit is contained in:
parent
045794df4c
commit
a634fd3a2d
1 changed files with 2 additions and 10 deletions
|
@ -4044,8 +4044,8 @@ next measurement has been made.
|
||||||
@node offline command
|
@node offline command
|
||||||
@subsubsection offline
|
@subsubsection offline
|
||||||
The @code{offline} command is used to warn @code{chronyd} that the network
|
The @code{offline} command is used to warn @code{chronyd} that the network
|
||||||
connection to a particular host or hosts is about to be lost. It should
|
connection to a particular host or hosts is about to be lost. It can
|
||||||
be used on computers with a dial-up or similar connection to their time
|
be used on computers with intermittent connection to their time
|
||||||
sources, to warn @code{chronyd} that the connection is about to be broken.
|
sources, to warn @code{chronyd} that the connection is about to be broken.
|
||||||
|
|
||||||
An example of how to use @code{offline} in this case is shown in
|
An example of how to use @code{offline} in this case is shown in
|
||||||
|
@ -4082,14 +4082,6 @@ achieve this. The situation is shown in the figure below.
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
If the source to which @code{chronyd} is currently synchronised is indicated
|
|
||||||
offline in this way, @code{chronyd} will continue to treat it as the
|
|
||||||
synchronisation source. If the network connection were broken without
|
|
||||||
the @code{offline} command being used, @code{chronyd} would assume that the
|
|
||||||
source had failed and would attempt to pick another synchronisation
|
|
||||||
source.
|
|
||||||
|
|
||||||
There are four forms of the @code{offline} command. The first form is a
|
There are four forms of the @code{offline} command. The first form is a
|
||||||
wildcard, meaning all sources. The second form allows an IP address mask
|
wildcard, meaning all sources. The second form allows an IP address mask
|
||||||
and a masked address to be specified. The third form uses the CIDR
|
and a masked address to be specified. The third form uses the CIDR
|
||||||
|
|
Loading…
Reference in a new issue