Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 219 for Unmount (0.07 sec)

  1. buildscripts/verify-healing-with-root-disks.sh

    		mkdir -p ${WORK_DIR}/mnt/disk${i}/
    		sudo mount ${device} ${WORK_DIR}/mnt/disk${i}/
    		sudo chown "$(id -u):$(id -g)" ${device} ${WORK_DIR}/mnt/disk${i}/
    	done
    	set +e
    }
    
    # Start a distributed MinIO setup, unmount one disk and check if it is formatted
    function main() {
    	start_port=$(shuf -i 10000-65000 -n 1)
    	start_minio ${start_port}
    
    	# Unmount the disk, after the unmount the device id
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 26 05:07:25 UTC 2023
    - 2.2K bytes
    - Viewed (0)
  2. docs/security/README.md

    - Seal the KMS such that it cannot be accessed by MinIO server anymore. That will lock **all** SSE-S3 encrypted objects protected by master keys stored on the KMS. All these objects can not be decrypted as long as the KMS is sealed.
    - Seal/Unmount one/some master keys. That will lock all SSE-S3 encrypted objects protected by these master keys. All these objects can not be decrypted as long as the key(s) are sealed.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 13.8K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.30.md

       ([#122334](https://github.com/kubernetes/kubernetes/pull/122334), [@carlory](https://github.com/carlory))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 04:40:14 UTC 2024
    - 309.1K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.25.md

    - On compatible systems, a mounter's Unmount implementation is changed to not return an error when the specified target can be detected as not a mount point. On Linux, the behavior of detecting a mount point depends on `umount` command is validated when the mounter is created. Additionally, mount point checks will be skipped in CleanupMountPoint/CleanupMountWithForce if the mounter's Unmount having the changed behavior of not returning error when target is not a...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.20.md

    ### Non-recursive Volume Ownership (FSGroup) graduates to Beta
    
    By default, the `fsgroup` setting, if specified, recursively updates permissions for every file in a volume on every mount. This can make mount, and pod startup, very slow if the volume has many files. 
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jan 19 21:05:45 UTC 2022
    - 409K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.15.md

    - Fix: azure file mount timeout issue ([#88610](https://github.com/kubernetes/kubernetes/pull/88610), [@andyzhangx](https://github.com/andyzhangx)) [SIG Cloud Provider and Storage]
    - Fix: corrupted mount point in csi driver ([#88569](https://github.com/kubernetes/kubernetes/pull/88569), [@andyzhangx](https://github.com/andyzhangx)) [SIG Storage]
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 278.9K bytes
    - Viewed (0)
  7. internal/mountinfo/mountinfo_linux.go

    	}
    	var crossMounts mountInfos
    	for _, mount := range mts {
    		// Add a separator to indicate that this is a proper mount-point.
    		// This is to avoid a situation where prefix is '/tmp/fsmount'
    		// and mount path is /tmp/fs. In such a scenario we need to check for
    		// `/tmp/fs/` to be a common prefix amount other mounts.
    		mpath := strings.TrimSuffix(mount.Path, "/") + "/"
    		ppath := strings.TrimSuffix(path, "/") + "/"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Jan 02 17:15:06 UTC 2022
    - 4.7K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.13.md

    * Because some plugins mount volume on sub-directory of volume path, we need to distinguish between volume path and mount path to fix issue in reconstruction. ([#74653](https://github.com/kubernetes/kubernetes/pull/74653), [@cofyc](https://github.com/cofyc))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 273.1K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.24.md

    - On compatible systems, a mounter's Unmount implementation is changed to not return an error when the specified target can be detected as not a mount point. On Linux, the behavior of detecting a mount point depends on `umount` command is validated when the mounter is created. Additionally, mount point checks will be skipped in CleanupMountPoint/CleanupMountWithForce if the mounter's Unmount having the changed behavior of not returning error when target is not a...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.23.md

    - Do not unmount and mount subpath bind mounts during container creation unless bind mount changes ([#105512](https://github.com/kubernetes/kubernetes/pull/105512), [@gnufied](https://github.com/gnufied)) [SIG Storage]
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
Back to top