- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 115 for Critical (0.2 sec)
-
src/cmd/compile/internal/ssa/critical.go
// Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package ssa // critical splits critical edges (those that go from a block with // more than one outedge to a block with more than one inedge). // Regalloc wants a critical-edge-free CFG so it can implement phi values. func critical(f *Func) { // maps from phi arg ID to the new block created for that argument
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 16 21:40:11 UTC 2023 - 3.1K bytes - Viewed (0) -
.github/labels.json
"pattern": "/^((?!critical|urgent).)*$/s" }, { "type": "descriptionMatches", "pattern": "/^((?!critical|urgent).)*$/s" } ] } }, "pr": { "critical": { "requires": 1, "conditions": [ { "type": "descriptionMatches", "pattern": "/(critical|urgent)/i" }, {
Registered: Wed Jun 12 16:27:09 UTC 2024 - Last Modified: Mon Oct 19 03:49:03 UTC 2020 - 3.8K bytes - Viewed (0) -
cluster/gce/addons/admission-resource-quota-critical-pods/resource-quota.yaml
# critical pods are configured as a limited resource by admission_controller_config.yaml, # which means they are disallowed unless explicitly allowed by a namespaced quota object. # This quota effectively removes the restriction on the number of critical pods allowed in the kube-system namespace. apiVersion: v1 kind: ResourceQuota metadata: name: gcp-critical-pods namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile spec:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jul 17 13:52:19 UTC 2020 - 644 bytes - Viewed (0) -
tools/certs/common.mk
@echo "x509_extensions = req_ext" >> $@ @echo "distinguished_name = req_dn" >> $@ @echo "[ req_ext ]" >> $@ @echo "subjectKeyIdentifier = hash" >> $@ @echo "basicConstraints = critical, CA:true" >> $@ @echo "keyUsage = critical, digitalSignature, nonRepudiation, keyEncipherment, keyCertSign" >> $@ @echo "[ req_dn ]" >> $@ @echo "O = $(ROOTCA_ORG)" >> $@ @echo "CN = $(ROOTCA_CN)" >> $@ %/intermediate.conf: L=$(dir $@)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Feb 20 08:51:56 UTC 2023 - 3.6K bytes - Viewed (0) -
pkg/apis/scheduling/v1/helpers_test.go
pc: &v1.PriorityClass{ ObjectMeta: metav1.ObjectMeta{ Name: scheduling.SystemNodeCritical, }, Value: scheduling.SystemCriticalPriority, // This is the value of system cluster critical Description: "Used for system critical pods that must not be moved from their current node.", }, expected: false, }, { name: "not a known system priority class", pc: &v1.PriorityClass{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 04 08:43:11 UTC 2020 - 2.3K bytes - Viewed (0) -
pkg/apis/scheduling/types.go
SystemPriorityClassPrefix = "system-" // SystemClusterCritical is the system priority class name that represents cluster-critical. SystemClusterCritical = SystemPriorityClassPrefix + "cluster-critical" // SystemNodeCritical is the system priority class name that represents node-critical. SystemNodeCritical = SystemPriorityClassPrefix + "node-critical" ) // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Feb 07 23:13:00 UTC 2024 - 3.7K bytes - Viewed (0) -
manifests/charts/istio-cni/README.md
``` Installation in `kube-system` is recommended to ensure the [`system-node-critical`](https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/) `priorityClassName` can be used. You can install in other namespace only on K8S clusters that allow 'system-node-critical' outside of kube-system. ## Configuration To view support configuration options and documentation, run:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 2.5K bytes - Viewed (0) -
docs/metrics/prometheus/alerts.md
repeat_interval: 1h receiver: 'web.hook' receivers: - name: 'web.hook' webhook_configs: - url: 'http://127.0.0.1:8010/webhook' inhibit_rules: - source_match: severity: 'critical' target_match: severity: 'warning' equal: ['alertname', 'dev', 'instance'] ``` This sample configuration uses a `webhook` at http://127.0.0.1:8010/webhook to post the alerts.
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sun Jan 28 20:53:59 UTC 2024 - 4.4K bytes - Viewed (0) -
pkg/util/interrupt/interrupt.go
// to a Run method), even in the presence of process termination. It guarantees exactly once // invocation of the provided notify functions. type Handler struct { notify []func() final func(os.Signal) once sync.Once } // New creates a new handler that guarantees all notify functions are run after the critical
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jan 16 09:22:35 UTC 2023 - 2.7K bytes - Viewed (0) -
pkg/test/cert/ca/root.go
utf8 = yes default_md = sha256 default_bits = 4096 req_extensions = req_ext x509_extensions = req_ext distinguished_name = req_dn [ req_ext ] subjectKeyIdentifier = hash basicConstraints = critical, CA:true keyUsage = critical, digitalSignature, nonRepudiation, keyEncipherment, keyCertSign [ req_dn ] O = Istio CN = Root CA` // Root contains the cryptographic files for a self-signed root CA. type Root struct {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Aug 03 18:09:59 UTC 2021 - 2.3K bytes - Viewed (0)