- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 28 for generator (0.34 sec)
-
helm/minio/README.md
With NetworkPolicy enabled, traffic will be limited to just port 9000. For more precise policy, set `networkPolicy.allowExternal=true`. This will only allow pods with the generated client label to connect to MinIO. This label will be displayed in the output of a successful install. ### Existing secret
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Jan 24 07:27:57 GMT 2024 - 10.9K bytes - Viewed (0) -
android-test/README.md
... 11:55:40 V/InstrumentationResultParser: Time: 13.271 11:55:40 V/InstrumentationResultParser: 11:55:40 V/InstrumentationResultParser: OK (12 tests) ... 11:55:40 I/XmlResultReporter: XML test result file generated at /Users/myusername/workspace/okhttp/android-test/build/outputs/androidTest-results/connected/TEST-pixel3a-Q(AVD) - 10-android-test-.xml. Total tests 13, passed 11, assumption_failure 1, ignored 1, ... BUILD SUCCESSFUL in 1m 30s
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Tue Feb 14 08:26:50 GMT 2023 - 2.5K bytes - Viewed (0) -
docs/docker/README.md
See the [Kubernetes documentation](https://min.io/docs/minio/kubernetes/upstream/index.html) for more information. ## MinIO Docker Tips ### MinIO Custom Access and Secret Keys To override MinIO's auto-generated keys, you may pass secret and access keys explicitly as environment variables. MinIO server also allows regular strings as access and secret keys. #### GNU/Linux and macOS (custom access and secret keys) ```sh docker run \
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 8.2K bytes - Viewed (0) -
docs/tls/kubernetes/README.md
For testing purposes, here is [how to create self-signed certificates](https://github.com/minio/minio/tree/master/docs/tls#3-generate-self-signed-certificates). ## 2. Create Kubernetes secret [Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret) are intended to hold sensitive information.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 3K bytes - Viewed (0) -
docs/config/README.md
## Configuration Directory
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 11 21:48:54 GMT 2023 - 17.7K bytes - Viewed (0) -
operator/README.md
istioctl profile dump default > 1.yaml istioctl profile dump demo > 2.yaml istioctl profile diff 1.yaml 2.yaml # show the differences in the generated manifests between the default profile and a customized install istioctl manifest generate > 1.yaml istioctl manifest generate -f samples/pilot-k8s.yaml > 2.yaml istioctl manifest diff 1.yam1 2.yaml ``` The profile dump sub-command supports a couple of useful flags:
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sun Sep 17 08:27:52 GMT 2023 - 17.5K bytes - Viewed (0) -
docs/bigdata/README.md
### **4.1 Spark Pi** Test the Spark installation by running the following compute intensive example, which calculates pi by “throwing darts” at a circle. The program generates points in the unit square ((0,0) to (1,1)) and counts how many points fall within the unit circle within the square. The result approximates pi. Follow these steps to run the Spark Pi example: - Login as user **‘spark’**.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 14.7K bytes - Viewed (0) -
okhttp-logging-interceptor/README.md
```java HttpLoggingInterceptor logging = new HttpLoggingInterceptor(new Logger() { @Override public void log(String message) { Timber.tag("OkHttp").d(message); } }); ``` **Warning**: The logs generated by this interceptor when using the `HEADERS` or `BODY` levels have the potential to leak sensitive information such as "Authorization" or "Cookie" headers and the
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Sun Dec 17 15:34:10 GMT 2023 - 1.3K bytes - Viewed (0) -
docs/sts/README.md
- Temporary credentials do not need to be stored with the application but are generated dynamically and provided to the application when requested. When (or even before) the temporary credentials expire, the application can request new credentials. Following are advantages for using temporary credentials:
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 7.8K bytes - Viewed (1) -
docs/bucket/replication/README.md
marker, permanent deletes, existing object replication and replica modification sync are all enabled. If you are using older mc versions, the ARN needs to be generated as a separate step before adding a replication rule. > NOTE: If you are using a mc version below `RELEASE.2022-12-24T15-21-38Z`, the --remote-bucket flag needs an ARN generated by `mc admin bucket remote add` command. For mc versions RELEASE.2021-09-02T09-21-27Z and older, the remote target ARN needs to be passed in the --arn...
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Jan 24 23:46:33 GMT 2023 - 18.2K bytes - Viewed (0)