Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for Twenty (0.2 sec)

  1. docs/bucket/replication/DESIGN.md

    It must be noted that if active-active replication is set up with delete marker replication, there is potential for duplicate delete markers to be created if both source and target concurrently set a Delete Marker or if one/both of the clusters went down at tandem before the replication event was synced.This is an unavoidable side-effect in active-active replication caused by allowing delete markers set on a object version with `REPLICA` status back to source.
    
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 14.7K bytes
    - Viewed (0)
  2. cmd/admin-handlers.go

    			w.Write(key[:])
    		}
    
    		stream, err := sio.AES_256_GCM.Stream(key[:])
    		if err != nil {
    			bugLogIf(ctx, err)
    			return
    		}
    		// Zero nonce, we only use each key once, and 32 bytes is plenty.
    		nonce := make([]byte, stream.NonceSize())
    		encw := stream.EncryptWriter(w, nonce, nil)
    		defer encw.Close()
    
    		// Initialize a zip writer which will provide a zipped content
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Sun Apr 21 11:43:18 GMT 2024
    - 97.3K bytes
    - Viewed (2)
  3. docs/distributed/DESIGN.md

    the number of drives to 16 for erasure set because, erasure code shards more than 16 can become chatty and do not have any performance advantages. Additionally since 16 drive erasure set gives you tolerance of 8 drives per object by default which is plenty in any practical scenario.
    
    - Choice of erasure set size is automatic based on the number of drives available, let's say for example if there are 32 servers and 32 drives which is a total of 1024 drives. In this scenario 16 becomes the erasure...
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Tue Aug 15 23:04:20 GMT 2023
    - 8K bytes
    - Viewed (0)
  4. docs/debugging/inspect/decrypt-v1.go

    		return fmt.Errorf("Invalid key checksum, want %x, got %x", want, got)
    	}
    
    	stream, err := sio.AES_256_GCM.Stream(key)
    	if err != nil {
    		return err
    	}
    	// Zero nonce, we only use each key once, and 32 bytes is plenty.
    	nonce := make([]byte, stream.NonceSize())
    	encr := stream.DecryptReader(r, nonce, nil)
    	_, err = io.Copy(w, encr)
    	if err == nil {
    		fmt.Println(okMsg)
    	}
    	return err
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 11 21:22:47 GMT 2024
    - 1.6K bytes
    - Viewed (0)
  5. internal/bpool/bpool.go

    		}
    	}
    	return
    }
    
    // Put returns the given Buffer to the BytePool.
    func (bp *BytePoolCap) Put(b []byte) {
    	if bp == nil {
    		return
    	}
    	select {
    	case bp.c <- b:
    		// buffer went back into pool
    	default:
    		// buffer didn't go back into pool, just discard
    	}
    }
    
    // Width returns the width of the byte arrays in this pool.
    func (bp *BytePoolCap) Width() (n int) {
    	if bp == nil {
    		return 0
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Fri Apr 19 16:44:59 GMT 2024
    - 2.6K bytes
    - Viewed (0)
Back to top