Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 14 for card (0.12 sec)

  1. docs/bucket/quota/README.md

    Buckets can be configured to have `Hard` quota - it disallows writes to the bucket after configured quota limit is reached.
    
    ## Prerequisites
    
    - Install MinIO - [MinIO Quickstart Guide](https://min.io/docs/minio/linux/index.html#procedure).
    - [Use `mc` with MinIO Server](https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart)
    
    ## Set bucket quota configuration
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Oct 25 00:44:15 GMT 2022
    - 1.1K bytes
    - Viewed (0)
  2. cmd/listen-notification-handlers.go

    	setEventStreamHeaders(w)
    
    	// Listen Publisher and peer-listen-client uses nonblocking send and hence does not wait for slow receivers.
    	// Use buffered channel to take care of burst sends or slow w.Write()
    	mergeCh := make(chan []byte, globalAPIConfig.getRequestsPoolCapacity()*len(globalEndpoints.Hostnames()))
    	localCh := make(chan event.Event, globalAPIConfig.getRequestsPoolCapacity())
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 6K bytes
    - Viewed (0)
  3. internal/logger/console.go

    func (f fatalMsg) pretty(msg string, args ...interface{}) {
    	// Build the passed error message
    	errMsg := fmt.Sprintf(msg, args...)
    
    	tagPrinted := false
    
    	// Print the error message: the following code takes care
    	// of splitting error text and always pretty printing the
    	// red banner along with the error message. Since the error
    	// message itself contains some colored text, we needed
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 17:57:52 GMT 2024
    - 5.8K bytes
    - Viewed (0)
  4. cmd/naughty-disk_test.go

    	"io"
    	"sync"
    	"time"
    
    	"github.com/minio/madmin-go/v3"
    )
    
    // naughtyDisk wraps a POSIX disk and returns programmed errors
    // specified by the developer. The purpose is to simulate errors
    // that are hard to simulate in practice like DiskNotFound.
    // Programmed errors are stored in errors field.
    type naughtyDisk struct {
    	// The real disk
    	disk StorageAPI
    	// Programmed errors: API call number => error to return
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Apr 23 17:15:52 GMT 2024
    - 9.3K bytes
    - Viewed (0)
  5. .gitignore

    docs/debugging/hash-set/hash-set
    docs/debugging/healing-bin/healing-bin
    docs/debugging/inspect/inspect
    docs/debugging/pprofgoparser/pprofgoparser
    docs/debugging/reorder-disks/reorder-disks
    docs/debugging/populate-hard-links/populate-hardlinks
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Dec 29 23:52:41 GMT 2023
    - 707 bytes
    - Viewed (0)
  6. docs/erasure/README.md

    Bit Rot, also known as data rot or silent data corruption is a data loss issue faced by disk drives today. Data on the drive may silently get corrupted without signaling an error has occurred, making bit rot more dangerous than a permanent hard drive failure.
    
    MinIO's erasure coded backend uses high speed [HighwayHash](https://github.com/minio/highwayhash) checksums to protect against Bit Rot.
    
    ## How are drives used for Erasure Code?
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 4.1K bytes
    - Viewed (0)
  7. cmd/bitrot.go

    		}
    	}
    	return nil
    }
    
    // bitrotSelfTest performs a self-test to ensure that bitrot
    // algorithms compute correct checksums. If any algorithm
    // produces an incorrect checksum it fails with a hard error.
    //
    // bitrotSelfTest tries to catch any issue in the bitrot implementation
    // early instead of silently corrupting data.
    func bitrotSelfTest() {
    	checksums := map[BitrotAlgorithm]string{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jan 30 20:43:25 GMT 2024
    - 7.6K bytes
    - Viewed (0)
  8. docs/sts/wso2.md

    ### 2. Configure WSO2
    
    Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens
    
    1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.7K bytes
    - Viewed (0)
  9. cmd/leak-detect_test.go

    	for _, stackFn := range ignoredStackFns {
    		if !strings.Contains(stack, stackFn) {
    			ok = false
    			continue
    		}
    		break
    	}
    	return ok
    }
    
    // pickRelevantGoroutines returns all goroutines we care about for the purpose
    // of leak checking. It excludes testing or runtime ones.
    func pickRelevantGoroutines() (gs []string) {
    	// get runtime stack buffer.
    	buf := debug.Stack()
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.2K bytes
    - Viewed (0)
  10. docs/distributed/CONFIG.md

    - Reload() of MinIO server arguments without fully restarting the process.
    
    - Expanding 1 node at a time by automating the process of creating a new pool
      and decommissioning to provide a functionality that smaller deployments
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri May 03 15:54:03 GMT 2024
    - 4.2K bytes
    - Viewed (0)
Back to top