- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 706 for Online (0.04 sec)
-
docs/en/docs/advanced/generate-clients.md
<img src="/img/tutorial/generate-clients/image08.png"> ## Benefits { #benefits } When using the automatically generated clients, you would get **autocompletion** for: * Methods. * Request payloads in the body, query parameters, etc. * Response payloads. You would also have **inline errors** for everything.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 10.1K bytes - Viewed (1) -
src/main/java/jcifs/internal/dtyp/ACE.java
* is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
internal/kms/conn.go
return "MinIO KES" case Builtin: return "MinIO builtin" default: return "!INVALID:" + strconv.Itoa(int(t)) } } // Status describes the current state of a KMS. type Status struct { Online map[string]struct{} Offline map[string]Error } // DEK is a data encryption key. It consists of a // plaintext-ciphertext pair and the ID of the key // used to generate the ciphertext. //
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 5K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
Examples of representing our community include using an official e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. ## Enforcement Instances of abusive, harassing, or otherwise unacceptable behavior may be reported to the community leaders responsible for enforcement at .
Registered: Sun Dec 28 09:35:17 UTC 2025 - Last Modified: Thu Oct 17 06:18:13 UTC 2024 - 5K bytes - Viewed (0) -
docs/site-replication/run-multi-site-minio-idp.sh
# Update tag on minio2/newbucket when minio1 is down ./mc tag set minio2/newbucket "key=val2" # create a new bucket on minio2. This should replicate to minio1 after it comes online. ./mc mb minio2/newbucket2 # delete bucket2 on minio2. This should replicate to minio1 after it comes online. ./mc rb minio2/bucket2 # Restart minio1 instance
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 12.1K bytes - Viewed (0) -
cmd/metrics-v3-system-drive.go
driveOfflineCountMD = NewGaugeMD(driveOfflineCount, "Count of offline drives") driveOnlineCountMD = NewGaugeMD(driveOnlineCount, "Count of online drives") driveCountMD = NewGaugeMD(driveCount, "Count of all drives") // iostat related driveReadsPerSecMD = NewGaugeMD(driveReadsPerSec, "Reads per second on a drive", allDriveLabels...)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Mar 30 00:56:02 UTC 2025 - 7.8K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
cmd/storage-interface.go
"github.com/minio/madmin-go/v3" ) // StorageAPI interface. type StorageAPI interface { // Stringified version of disk. String() string // Storage operations. // Returns true if disk is online and its valid i.e valid format.json. // This has nothing to do with if the drive is hung or not responding. // For that individual storage API calls will fail properly. The purposeRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 25 05:41:04 UTC 2025 - 5.3K bytes - Viewed (0) -
cmd/xl-storage-disk-id-check.go
"node(%s): Read/Write/Delete successful, bringing drive %s online", globalLocalNodeName, p.storage.String()) p.health.status.Store(diskHealthOK) p.health.waiting.Add(-1) return } } } // monitorDiskStatus should be called once when a drive has been marked offline. // Once the disk has been deemed ok, it will return to online status. func (p *xlStorageDiskIDCheck) monitorDiskWritable(ctx context.Context) {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 25 05:41:04 UTC 2025 - 34.5K bytes - Viewed (0) -
cmd/erasure-heal_test.go
"testing" ) var erasureHealTests = []struct { dataBlocks, disks int // number of offline disks is also number of staleDisks for // erasure reconstruction in this test offDisks int // bad disks are online disks which return errors badDisks, badStaleDisks int blocksize, size int64 algorithm BitrotAlgorithm shouldFail bool }{
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 7.9K bytes - Viewed (0)