- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 754 for Rate (0.02 sec)
-
cni/pkg/nodeagent/ztunnelserver.go
// and they will only connect once and persist. // However, if they do get in a state where they call us in a loop, we will quickly OOM limit := rate.NewLimiter(rate.Limit(5), 1) for { log.Debug("accepting conn") if err := limit.Wait(ctx); err != nil { log.Errorf("failed to wait for ztunnel connection: %v", err) return } conn, err := z.accept()
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jul 29 16:08:35 UTC 2024 - 13.2K bytes - Viewed (0) -
cmd/speedtest.go
throughputHighestPut = totalPut // let the client see lower value as well throughputHighestGet = totalGet } sendResult() break } // We break if we did not see 2.5% growth rate in total GET // requests, we have reached our peak at this point. doBreak := float64(totalGet-throughputHighestGet)/float64(totalGet) < 0.025 throughputHighestGet = totalGet throughputHighestResults = results
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 06 09:45:10 UTC 2024 - 9.2K bytes - Viewed (0) -
istioctl/pkg/cli/context.go
rc, err := kube.DefaultRestConfig(kubeconfig, configContext, func(config *rest.Config) { // We are running a one-off command locally, so we don't need to worry too much about rate limiting // Bumping this up greatly decreases install time config.QPS = 50 config.Burst = 100 config.Impersonate = impersonateConfig }) if err != nil { return nil, err }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Oct 23 19:31:32 UTC 2024 - 8.9K bytes - Viewed (0) -
manifests/addons/dashboards/lib/panels.libsonnet
+ override.byName.withProperty('decimals', 2) + override.byName.withProperty('unit', 'ms'), override.byName.new('Value #success') + override.byName.withProperty('displayName', 'Success Rate') + override.byName.withProperty('decimals', 2) + override.byName.withProperty('unit', 'percentunit') + override.byName.withProperty('custom.cellOptions', { type: 'color-background' })
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Jul 26 23:54:32 UTC 2024 - 9.5K bytes - Viewed (0) -
manifests/addons/dashboards/istio-service-dashboard.json
"format": "time_series", "intervalFactor": 1, "range": true, "refId": "A" } ], "title": "Client Success Rate (non-5xx responses)", "type": "stat" }, { "datasource": { "type": "prometheus", "uid": "${datasource}" }, "fieldConfig": { "defaults": {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Mar 27 03:47:04 UTC 2024 - 111.8K bytes - Viewed (0) -
SECURITY.md
potentially exploit a vulnerability in the TensorFlow code that handles videos, which could allow them to execute arbitrary code on the system running TensorFlow. It is important to keep TensorFlow up to date with the latest security patches and follow the sandboxing guideline above to protect against these types of vulnerabilities. ## Security properties of execution modes
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
docs/metrics/prometheus/grafana/replication/minio-replication-node.json
"interval": "1m", "intervalFactor": 2, "legendFormat": "{{server}}", "refId": "A" } ], "title": "Avg. Transfer Rate (bytes/s)", "type": "timeseries" }, { "datasource": { "type": "prometheus", "uid": "${DS_PROMETHEUS}" }, "fieldConfig": { "defaults": {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jun 13 22:26:54 UTC 2024 - 57.4K bytes - Viewed (0) -
docs/metrics/prometheus/list.md
| `minio_node_replication_average_transfer_rate` | Average replication transfer rate in bytes/sec | | `minio_node_replication_max_transfer_rate` | Maximum replication transfer rate in bytes/sec seen since server start |
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 29 18:48:51 UTC 2024 - 43.3K bytes - Viewed (0) -
docs/metrics/v3.md
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Aug 02 22:30:11 UTC 2024 - 45.2K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/AbstractScheduledService.java
* late. Also, all life cycle methods are executed with a lock held, so subclasses can safely modify * shared state without additional synchronization necessary for visibility to later executions of * the life cycle methods. * * <h3>Usage Example</h3> * * <p>Here is a sketch of a service which crawls a website and uses the scheduling capabilities to * rate limit itself. * * <pre>{@code
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 16:22:21 UTC 2024 - 27.8K bytes - Viewed (0)