Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 706 for Online (0.04 sec)

  1. docs/en/docs/advanced/generate-clients.md

    <img src="/img/tutorial/generate-clients/image08.png">
    
    ## Benefits { #benefits }
    
    When using the automatically generated clients, you would get **autocompletion** for:
    
    * Methods.
    * Request payloads in the body, query parameters, etc.
    * Response payloads.
    
    You would also have **inline errors** for everything.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 20:41:43 UTC 2025
    - 10.1K bytes
    - Viewed (1)
  2. src/main/java/jcifs/internal/dtyp/ACE.java

     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  3. internal/kms/conn.go

    		return "MinIO KES"
    	case Builtin:
    		return "MinIO builtin"
    	default:
    		return "!INVALID:" + strconv.Itoa(int(t))
    	}
    }
    
    // Status describes the current state of a KMS.
    type Status struct {
    	Online  map[string]struct{}
    	Offline map[string]Error
    }
    
    // DEK is a data encryption key. It consists of a
    // plaintext-ciphertext pair and the ID of the key
    // used to generate the ciphertext.
    //
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 5K bytes
    - Viewed (0)
  4. CODE_OF_CONDUCT.md

    Examples of representing our community include using an official e-mail address,
    posting via an official social media account, or acting as an appointed
    representative at an online or offline event.
    
    ## Enforcement
    
    Instances of abusive, harassing, or otherwise unacceptable behavior may be
    reported to the community leaders responsible for enforcement at
    .
    Registered: Sun Dec 28 09:35:17 UTC 2025
    - Last Modified: Thu Oct 17 06:18:13 UTC 2024
    - 5K bytes
    - Viewed (0)
  5. docs/site-replication/run-multi-site-minio-idp.sh

    # Update tag on minio2/newbucket when minio1 is down
    ./mc tag set minio2/newbucket "key=val2"
    # create a new bucket on minio2. This should replicate to minio1 after it comes online.
    ./mc mb minio2/newbucket2
    
    # delete bucket2 on minio2. This should replicate to minio1 after it comes online.
    ./mc rb minio2/bucket2
    
    # Restart minio1 instance
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 12.1K bytes
    - Viewed (0)
  6. cmd/metrics-v3-system-drive.go

    	driveOfflineCountMD = NewGaugeMD(driveOfflineCount,
    		"Count of offline drives")
    	driveOnlineCountMD = NewGaugeMD(driveOnlineCount,
    		"Count of online drives")
    	driveCountMD = NewGaugeMD(driveCount,
    		"Count of all drives")
    
    	// iostat related
    	driveReadsPerSecMD = NewGaugeMD(driveReadsPerSec,
    		"Reads per second on a drive",
    		allDriveLabels...)
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Mar 30 00:56:02 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  7. src/main/java/jcifs/ACE.java

     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  8. cmd/storage-interface.go

    	"github.com/minio/madmin-go/v3"
    )
    
    // StorageAPI interface.
    type StorageAPI interface {
    	// Stringified version of disk.
    	String() string
    
    	// Storage operations.
    
    	// Returns true if disk is online and its valid i.e valid format.json.
    	// This has nothing to do with if the drive is hung or not responding.
    	// For that individual storage API calls will fail properly. The purpose
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Apr 25 05:41:04 UTC 2025
    - 5.3K bytes
    - Viewed (0)
  9. cmd/xl-storage-disk-id-check.go

    				"node(%s): Read/Write/Delete successful, bringing drive %s online", globalLocalNodeName, p.storage.String())
    			p.health.status.Store(diskHealthOK)
    			p.health.waiting.Add(-1)
    			return
    		}
    	}
    }
    
    // monitorDiskStatus should be called once when a drive has been marked offline.
    // Once the disk has been deemed ok, it will return to online status.
    func (p *xlStorageDiskIDCheck) monitorDiskWritable(ctx context.Context) {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Apr 25 05:41:04 UTC 2025
    - 34.5K bytes
    - Viewed (0)
  10. cmd/erasure-heal_test.go

    	"testing"
    )
    
    var erasureHealTests = []struct {
    	dataBlocks, disks int
    
    	// number of offline disks is also number of staleDisks for
    	// erasure reconstruction in this test
    	offDisks int
    
    	// bad disks are online disks which return errors
    	badDisks, badStaleDisks int
    
    	blocksize, size int64
    	algorithm       BitrotAlgorithm
    	shouldFail      bool
    }{
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 7.9K bytes
    - Viewed (0)
Back to top