- Sort Score
- Result 10 results
- Languages All
Results 251 - 260 of 1,659 for provider2 (0.12 sec)
-
CHANGELOG/CHANGELOG-1.11.md
([#64706](https://github.com/kubernetes/kubernetes/pull/64706), [@liztio](https://github.com/liztio))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 328.4K bytes - Viewed (0) -
docs/changelogs/changelog_3x.md
interval of 30 seconds is reasonable for most use cases. * **OkHttp now supports [Conscrypt][conscrypt].** Conscrypt is a Java Security Provider that integrates BoringSSL into the Java platform. Conscrypt supports more cipher suites than the JVM’s default provider and may also execute more efficiently. To use it, first register a [Conscrypt dependency][conscrypt_dependency] in your build system.
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Feb 06 14:55:54 UTC 2022 - 50.8K bytes - Viewed (0) -
cmd/endpoint-ellipses.go
"github.com/minio/pkg/v3/env" ) // This file implements and supports ellipses pattern for // `minio server` command line arguments. // Endpoint set represents parsed ellipses values, also provides // methods to get the sets of endpoints. type endpointSet struct { argPatterns []ellipses.ArgPattern endpoints []string // Endpoints saved from previous GetEndpoints(). setIndexes [][]uint64 // All the sets. }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 14 17:11:51 UTC 2024 - 14.7K bytes - Viewed (0) -
docs/en/docs/fastapi-cli.md
In most cases you would (and should) have a "termination proxy" handling HTTPS for you on top, this will depend on how you deploy your application, your provider might do this for you, or you might need to set it up yourself. /// tip You can learn more about it in the [deployment documentation](deployment/index.md){.internal-link target=_blank}.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 6.1K bytes - Viewed (0) -
internal/config/errors.go
) ErrInvalidCredentials = newErrFn( "Invalid credentials", "Please provide correct credentials", `Access key length should be at least 3, and secret key length at least 8 characters`, ) ErrInvalidRootUserCredentials = newErrFn( "Invalid credentials", "Please provide correct credentials", EnvRootUser+` length should be at least 3, and `+EnvRootPassword+` length at least 8 characters`, )
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 16:57:01 UTC 2024 - 9.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
## Changelog since v1.3.0-beta.2 ### Action Required * [kubelet] Allow opting out of automatic cloud provider detection in kubelet. By default kubelet will auto-detect cloud providers ([#28258](https://github.com/kubernetes/kubernetes/pull/28258), [@vishh](https://github.com/vishh))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
src/bufio/scan.go
// Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package bufio import ( "bytes" "errors" "io" "unicode/utf8" ) // Scanner provides a convenient interface for reading data such as // a file of newline-delimited lines of text. Successive calls to // the [Scanner.Scan] method will step through the 'tokens' of a file, skipping
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 23 09:06:30 UTC 2023 - 14.2K bytes - Viewed (0) -
docs/kms/IAM.md
The root credentials can now be changed easily. > Does this mean I need an enterprise KMS setup to run MinIO (securely)? No, MinIO does not depend on any third-party KMS provider. You have three options here: - Run MinIO without a KMS. In this case all IAM data will be stored in plain-text. - Run MinIO with a single secret key. MinIO supports a static cryptographic key
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
docs/distributed/DESIGN.md
possible sets, with 4 drives we get a total of 256 possible sets. So algorithm automatically chooses 64 sets, which is *16* 64 = 1024* drives in total. - *If total number of nodes are of odd number then GCD algorithm provides affinity towards odd number erasure sets to provide for uniform distribution across nodes*. This is to ensure that same number of drives are pariticipating in any erasure set. For example if you have 2 nodes with 180 drives then GCD is 15 but this would lead to uneven distribution,...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 15 23:04:20 UTC 2023 - 8K bytes - Viewed (1) -
SECURITY.md
### Model sharing If the multitenant design allows sharing models, make sure that tenants and users are aware of the security risks detailed here and that they are going to be practically running code provided by other users. Currently there are no good ways to detect malicious models/graphs/checkpoints, so the recommended way to mitigate the risk in this scenario is to sandbox the model execution. ### Hardware attacks
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0)