Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 503 for attaches (0.17 sec)

  1. common-protos/k8s.io/api/core/v1/generated.proto

      optional PhotonPersistentDiskVolumeSource photonPersistentDisk = 17;
    
      // portworxVolume represents a portworx volume attached and mounted on kubelets host machine
      // +optional
      optional PortworxVolumeSource portworxVolume = 18;
    
      // scaleIO represents a ScaleIO persistent volume attached and mounted on Kubernetes nodes.
      // +optional
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 255.8K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/storage/v1alpha1/generated.proto

    message VolumeAttachmentStatus {
      // attached indicates the volume is successfully attached.
      // This field must only be set by the entity completing the attach
      // operation, i.e. the external-attacher.
      optional bool attached = 1;
    
      // attachmentMetadata is populated with any
      // information returned by the attach operation, upon successful attach, that must be passed
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 9.4K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/storage/v1/generated.proto

    message VolumeAttachmentStatus {
      // attached indicates the volume is successfully attached.
      // This field must only be set by the entity completing the attach
      // operation, i.e. the external-attacher.
      optional bool attached = 1;
    
      // attachmentMetadata is populated with any
      // information returned by the attach operation, upon successful attach, that must be passed
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 24.7K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/storage/v1beta1/generated.proto

    message VolumeAttachmentStatus {
      // attached indicates the volume is successfully attached.
      // This field must only be set by the entity completing the attach
      // operation, i.e. the external-attacher.
      optional bool attached = 1;
    
      // attachmentMetadata is populated with any
      // information returned by the attach operation, upon successful attach, that must be passed
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 24.9K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.12.md

    * Add support for volume attach limits for CSI volumes ([#67731](https://github.com/kubernetes/kubernetes/pull/67731), [@gnufied](https://github.com/gnufied))
    * CSI volume plugin does not need external attacher for non-attachable CSI volumes. ([#67955](https://github.com/kubernetes/kubernetes/pull/67955), [@jsafrane](https://github.com/jsafrane))
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Feb 06 06:04:15 GMT 2020
    - 293.8K bytes
    - Viewed (1)
  6. src/main/webapp/js/jquery-3.6.3.min.map

    Plain Text
    - Registered: Mon May 06 08:04:11 GMT 2024
    - Last Modified: Fri Feb 17 12:13:41 GMT 2023
    - 135.2K bytes
    - Viewed (0)
  7. src/main/webapp/js/admin/jquery-3.6.3.min.map

    Plain Text
    - Registered: Mon May 06 08:04:11 GMT 2024
    - Last Modified: Fri Feb 17 12:13:41 GMT 2023
    - 135.2K bytes
    - Viewed (0)
  8. SECURITY.md

    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
  9. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Jan 11 14:33:05 GMT 2024
    - 5.9K bytes
    - Viewed (0)
  10. .github/ISSUE_TEMPLATE/tflite-converter-issue.md

    ```
    (You can paste links or attach files by dragging & dropping them below)
    - Provide links to your updated versions of the above two colab notebooks.
    - Provide links to your TensorFlow model and (optionally) TensorFlow Lite Model.
    ```
    
    #### Option B: Paste your code here or provide a link to a custom end-to-end colab
    
    ```
    (You can paste links or attach files by dragging & dropping them below)
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Wed Jun 15 03:35:58 GMT 2022
    - 2.1K bytes
    - Viewed (0)
Back to top