- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 58 for Goff (0.17 sec)
-
RELEASE.md
from when they are off due to floating-point round-off errors from different computation approaches and orders. * To verify that the optimizations are on, look for a message with "*oneDNN custom operations are on*" in the log. If the exact phrase is not there, it means they are off. ## Bug Fixes and Other Changes
Plain Text - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Mon Apr 29 19:17:57 GMT 2024 - 727.7K bytes - Viewed (8) -
CHANGELOG/CHANGELOG-1.24.md
- [Changelog since v1.23.0](#changelog-since-v1230) - [Major Themes](#major-themes) - [Dockershim Removed from kubelet](#dockershim-removed-from-kubelet) - [Beta APIs Off by Default](#beta-apis-off-by-default) - [Signing Release Artifacts](#signing-release-artifacts) - [OpenAPI v3](#openapi-v3)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
- The kube-proxy sync_proxy_rules_iptables_total metric now gives the correct number of rules, rather than being off by one. Fixed multiple iptables proxy regressions introduced in 1.22: - When using Services with SessionAffinity, client affinity for an endpoint now gets broken when that endpoint becomes non-ready
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
### Promoted CSI Ephemeral Volume to Stable
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Nov 16 11:30:31 GMT 2023 - 419K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
- The --leader-elect* CLI args are now honored correctly in scheduler. (#106130, @Huang-Wei) [SIG Scheduling] - The kube-proxy sync_proxy_rules_iptables_total metric now gives the correct number of rules, rather than being off by one. Fixed multiple iptables proxy regressions introduced in 1.22: - When using Services with SessionAffinity, client affinity for an endpoint now gets broken when that endpoint becomes non-ready
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Viewed (1) -
.github/workflows/mint/nginx.conf
# To allow special characters in headers ignore_invalid_headers off; # Allow any size file to be uploaded. # Set to a value such as 1000m; to restrict file size to a specific value client_max_body_size 0; # To disable buffering proxy_buffering off; proxy_request_buffering off; location / { proxy_set_header Host $http_host;
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Mar 31 21:38:10 GMT 2023 - 3K bytes - Viewed (0) -
.github/workflows/multipart/nginx-site1.conf
# To allow special characters in headers ignore_invalid_headers off; # Allow any size file to be uploaded. # Set to a value such as 1000m; to restrict file size to a specific value client_max_body_size 0; # To disable buffering proxy_buffering off; proxy_request_buffering off; location / { proxy_set_header Host $http_host;
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Sep 30 10:13:56 GMT 2023 - 1.7K bytes - Viewed (0) -
docs/config/README.md
root_access (boolean) turn 'off' root credential access for all API calls including s3, admin operations (default: 'on') sync_events (boolean) set to enable synchronous bucket notifications (default: 'off') ``` or environment variables ```
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 11 21:48:54 GMT 2023 - 17.7K bytes - Viewed (0) -
docs/sts/ldap.md
MINIO_IDENTITY_LDAP_TLS_SKIP_VERIFY (on|off) trust server TLS without verification, defaults to "off" (verify) MINIO_IDENTITY_LDAP_SERVER_INSECURE (on|off) allow plain text connection to AD/LDAP server, defaults to "off" MINIO_IDENTITY_LDAP_SERVER_STARTTLS (on|off) use StartTLS connection to AD/LDAP server, defaults to "off"
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 18.4K bytes - Viewed (1) -
CONTRIBUTING.md
### Fixing DCO failures/Signing Off Commits After Submitting a Pull Request You must agree to the terms of [Developer Certificate of Origin](https://developercertificate.org/) by signing off your commits. We automatically verify that all commit messages contain a `Signed-off-by:` line with your email address. We can only accept PRs that have all commits signed off.
Plain Text - Registered: Wed May 08 11:36:15 GMT 2024 - Last Modified: Sat May 04 07:43:02 GMT 2024 - 15.6K bytes - Viewed (0)