Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for Ward (0.4 sec)

  1. docs/kms/IAM.md

       There used to be two different mechanisms - one for regular S3 objects and one for IAM data.
    - Reduced server startup time. For IAM encryption with the root credentials, MinIO had
       to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
       The new KMS-based approach can use a key derivation function that is orders of magnitudes
       cheaper w.r.t. memory and CPU.
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Viewed (0)
  2. docs/bucket/replication/README.md

    When an object is deleted from the source bucket, the corresponding replica version will be marked deleted if delete marker replication is enabled in the replication configuration. Replication of deletes that specify a version id (a.k.a hard deletes) can be enabled by setting the `DeleteReplication` status to enabled in the replication configuration. This is a MinIO specific extension that can be enabled using the `mc replicate add` or `mc replicate edit` command with the --replicate "delete"...
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Tue Jan 24 23:46:33 GMT 2023
    - 18.2K bytes
    - Viewed (0)
  3. docs/bucket/quota/README.md

    Buckets can be configured to have `Hard` quota - it disallows writes to the bucket after configured quota limit is reached.
    
    ## Prerequisites
    
    - Install MinIO - [MinIO Quickstart Guide](https://min.io/docs/minio/linux/index.html#procedure).
    - [Use `mc` with MinIO Server](https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart)
    
    ## Set bucket quota configuration
    
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Tue Oct 25 00:44:15 GMT 2022
    - 1.1K bytes
    - Viewed (0)
  4. .gitignore

    docs/debugging/hash-set/hash-set
    docs/debugging/healing-bin/healing-bin
    docs/debugging/inspect/inspect
    docs/debugging/pprofgoparser/pprofgoparser
    docs/debugging/reorder-disks/reorder-disks
    docs/debugging/populate-hard-links/populate-hardlinks
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Fri Dec 29 23:52:41 GMT 2023
    - 707 bytes
    - Viewed (0)
  5. docs/erasure/README.md

    Bit Rot, also known as data rot or silent data corruption is a data loss issue faced by disk drives today. Data on the drive may silently get corrupted without signaling an error has occurred, making bit rot more dangerous than a permanent hard drive failure.
    
    MinIO's erasure coded backend uses high speed [HighwayHash](https://github.com/minio/highwayhash) checksums to protect against Bit Rot.
    
    ## How are drives used for Erasure Code?
    
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 4.1K bytes
    - Viewed (0)
  6. docs/sts/wso2.md

    ### 2. Configure WSO2
    
    Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens
    
    1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.7K bytes
    - Viewed (0)
Back to top