Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 35 for One (0.12 sec)

  1. helm/minio/.helmignore

    # Patterns to ignore when building packages.
    # This supports shell glob matching, relative path matching, and
    # negation (prefixed with !). Only one pattern per line.
    .DS_Store
    # Common VCS dirs
    .git/
    .gitignore
    .bzr/
    .bzrignore
    .hg/
    .hgignore
    .svn/
    # Common backup files
    *.swp
    *.bak
    *.tmp
    *~
    # Various IDEs
    .project
    .idea/
    *.tmproj
    # OWNERS file for Kubernetes
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Aug 20 22:30:54 GMT 2021
    - 368 bytes
    - Viewed (0)
  2. docs/sts/web-identity.md

    By default, the temporary security credentials created by AssumeRoleWithWebIdentity last for one hour. However, the optional DurationSeconds parameter can be used to specify the validity duration of the generated credentials. This value varies from 900 seconds (15 minutes) up to the maximum session duration of 365 days.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 19.2K bytes
    - Viewed (1)
  3. docs/bucket/retention/README.md

    ### 2. Set bucket WORM configuration
    
    WORM on a bucket is enabled by setting object lock configuration. This configuration is applied to all the objects in the bucket. Below is an example to set `Governance` mode and one day retention time on `mybucket`.
    
    ```sh
    awscli s3api put-object-lock-configuration --bucket mybucket --object-lock-configuration 'ObjectLockEnabled=\"Enabled\",Rule={DefaultRetention={Mode=\"GOVERNANCE\",Days=1}}'
    ```
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 3.9K bytes
    - Viewed (0)
  4. docs/metrics/prometheus/README.md

    reading further and move to 3.2 section.
    
    The Prometheus endpoint in MinIO requires authentication by default. Prometheus supports a bearer token approach to authenticate prometheus scrape requests, override the default Prometheus config with the one generated using mc. To generate a Prometheus config for an alias, use [mc](https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart) as follows `mc admin prometheus generate <alias> [METRIC-TYPE]`. The valid values for METRIC-TYPE are `cluster`,...
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 12 15:49:30 GMT 2024
    - 7.1K bytes
    - Viewed (0)
  5. helm/minio/README.md

    ```
    
    Description of the configuration parameters used above -
    
    - `buckets[].name` - name of the bucket to create, must be a string with length > 0
    - `buckets[].policy` - can be one of none|download|upload|public
    - `buckets[].purge` - purge if bucket exists already
    
    ### Create policies after install
    
    Install the chart, specifying the policies you want to create after install:
    
    ```bash
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed Jan 24 07:27:57 GMT 2024
    - 10.9K bytes
    - Viewed (0)
  6. docs/site-replication/README.md

    The following Bucket features will **not be replicated**, is designed to differ between sites:
    
    - Bucket notification configuration
    - Bucket lifecycle (ILM) configuration
    
    ## Pre-requisites
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Feb 26 21:30:28 GMT 2024
    - 3.4K bytes
    - Viewed (0)
  7. docs/erasure/README.md

    unlike RAID or replication. For example, RAID6 can protect against two drive failure whereas in MinIO erasure code you can lose as many as half of drives and still the data remains safe. Further, MinIO's erasure code is at the object level and can heal one object at a time. For RAID, healing can be done only at the volume level which translates into high downtime. As MinIO encodes each object individually, it can heal objects incrementally. Storage servers once deployed should not require drive replacement...
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 4.1K bytes
    - Viewed (0)
  8. docs/multi-tenancy/README.md

    2. [Distributed Deployment](#distributed-deployment)
    3. [Cloud Scale Deployment](#cloud-scale-deployment)
    
    ## 1. Standalone Deployment
    
    To host multiple tenants on a single machine, run one MinIO Server per tenant with a dedicated HTTPS port, configuration, and data directory.
    
    ### 1.1 Host Multiple Tenants on a Single Drive
    
    Use the following commands to host 3 tenants on a single drive:
    
    ```sh
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 3K bytes
    - Viewed (0)
  9. docs/bucket/lifecycle/DESIGN.md

    ## Implementation
    
    ILM tiering takes place when a object placed in the bucket meets lifecycle transition rules and becomes eligible for tiering. MinIO scanner (which runs at one minute intervals, each time scanning one sixteenth of the namespace), picks up the object for tiering. The data is moved to the remote tier in entirety, leaving only the object metadata on MinIO.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 4.3K bytes
    - Viewed (0)
  10. VULNERABILITY_REPORT.md

    - Whether the reported vulnerability exists.
    - The conditions that are required such that the vulnerability can be exploited.
    - The steps required to fix the vulnerability.
    
    In general, if the vulnerability exists in one of the MinIO code bases
    itself - not in a code dependency - then MinIO will, if possible, fix
    the vulnerability or implement reasonable countermeasures such that the
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 1.5K bytes
    - Viewed (0)
Back to top