- Sort Score
- Result 10 results
- Languages All
Results 1 - 6 of 6 for rotate3d (0.08 sec)
-
internal/logger/logrotate.go
stdErrEnc.Encode(&log.Entry{ Level: ErrorKind, Message: msg, Time: time.Now().UTC(), Trace: &log.Trace{Message: msg}, }) } if err := w.rotate(); err != nil { msg := fmt.Sprintf("unable to rotate log file %v: %v", w.f.Name(), err) stdErrEnc.Encode(&log.Entry{ Level: ErrorKind, Message: msg, Time: time.Now().UTC(), Trace: &log.Trace{Message: msg}, })
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 5.8K bytes - Viewed (0) -
src/main/webapp/css/admin/plugins/daterangepicker/daterangepicker.css
border-radius: 0; display: inline-block; padding: 3px; } .daterangepicker .calendar-table .next span { transform: rotate(-45deg); -webkit-transform: rotate(-45deg); } .daterangepicker .calendar-table .prev span { transform: rotate(135deg); -webkit-transform: rotate(135deg); } .daterangepicker .calendar-table th, .daterangepicker .calendar-table td { white-space: nowrap;
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 7.5K bytes - Viewed (0) -
architecture/security/istio-agent.md
topologies mix and match these two. For a standard Kubernetes deployment, both CA and discovery will use JWT authentication, with a token automatically [generated and rotated by Kubernetes](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#service-account-token-volume-projection).
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 18 23:11:18 UTC 2024 - 7.2K bytes - Viewed (0) -
src/cmd/asm/internal/lex/lex.go
ARR // -> Used on ARM for shift type 3, arithmetic right shift. ROT // @> Used on ARM for shift type 4, rotate right. Include // included file started here BuildComment // //go:build or +build comment macroName // name of macro that should not be expanded
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Tue Aug 29 18:31:05 UTC 2023 - 4.1K bytes - Viewed (0) -
docs/sts/README.md
- Eliminates the need to provide access to buckets and objects without having to define static credentials. - Temporary credentials have a limited lifetime, there is no need to rotate them or explicitly revoke them. Expired temporary credentials cannot be reused. ## Identity Federation
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 7.8K bytes - Viewed (0) -
docs/kms/IAM.md
change unified the key-management aspect within MinIO. The unified KMS-based approach has several advantages: - Key management is now centralized. There is one way to change or rotate encryption keys. There used to be two different mechanisms - one for regular S3 objects and one for IAM data. - Reduced server startup time. For IAM encryption with the root credentials, MinIO had
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0)