- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for Reconciled (0.17 sec)
-
tests/integration/pilot/analysis/analysis_test.go
} statusConds := x.Status.Conditions // todo for some reason when a WorkloadEntry is created a "Reconciled" Condition isn't added. for i, cond := range x.Status.Conditions { // remove reconciled conditions for when WorkloadEntry starts initializing // with a reconciled status. if cond.Type == "Reconciled" { statusConds = append(statusConds[:i], statusConds[i+1:]...) } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 8.7K bytes - Viewed (0) -
pkg/controlplane/apiserver/peer.go
config, err := storageFactory.NewConfig(api.Resource("apiServerPeerIPInfo")) if err != nil { return nil, fmt.Errorf("error creating storage factory config: %w", err) } reconciler, err := reconcilers.NewPeerEndpointLeaseReconciler(config, "/peerserverleases/", ttl) return reconciler, err } // utility function to get the apiserver address that is used by peer apiservers to proxy
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 29 08:15:02 UTC 2024 - 3.9K bytes - Viewed (0) -
pkg/kubelet/volumemanager/reconciler/reconciler.go
limitations under the License. */ package reconciler import ( "k8s.io/apimachinery/pkg/util/wait" "k8s.io/klog/v2" ) func (rc *reconciler) Run(stopCh <-chan struct{}) { rc.reconstructVolumes() klog.InfoS("Reconciler: start to sync state") wait.Until(rc.reconcile, rc.loopSleepDuration, stopCh) } func (rc *reconciler) reconcile() { readyToUnmount := rc.readyToUnmount() if readyToUnmount {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 10:23:12 UTC 2024 - 2.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/internal/generic/controller.go
informer Informer[T], reconciler func(namepace, name string, newObj T) error, options ControllerOptions, ) Controller[T] { if options.Workers == 0 { options.Workers = 2 } if len(options.Name) == 0 { options.Name = fmt.Sprintf("%T-controller", *new(T)) } c := &controller[T]{ options: options, informer: informer, reconciler: reconciler, queue: nil, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 7.5K bytes - Viewed (0) -
pkg/kubelet/volumemanager/reconciler/reconstruct.go
limitations under the License. */ package reconciler import ( "context" v1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" "k8s.io/klog/v2" "k8s.io/kubernetes/pkg/volume/util/operationexecutor" ) // readyToUnmount returns true when reconciler can start unmounting volumes. func (rc *reconciler) readyToUnmount() bool {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 10:23:12 UTC 2024 - 8.9K bytes - Viewed (0) -
pkg/controller/validatingadmissionpolicystatus/controller.go
return nil } return err } return c.reconcile(ctx, policy) }() if err == nil { c.policyQueue.Forget(key) return true } utilruntime.HandleError(err) c.policyQueue.AddRateLimited(key) return true } func (c *Controller) reconcile(ctx context.Context, policy *v1.ValidatingAdmissionPolicy) error { if policy == nil { return nil
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 5.3K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml
kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: system:network-policies namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: [""] resources: - pods - nodes - namespaces verbs: - get - watch - list # Watch for changes to Kubernetes NetworkPolicies. - apiGroups: ["networking.k8s.io"] resources:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 21 10:01:31 UTC 2024 - 1.1K bytes - Viewed (0) -
cluster/addons/node-problem-detector/npd.yaml
namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 30 04:14:02 UTC 2024 - 2.6K bytes - Viewed (0) -
cluster/addons/dns/nodelocaldns/nodelocaldns.yaml
labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- apiVersion: v1 kind: Service metadata: name: kube-dns-upstream namespace: kube-system labels: k8s-app: kube-dns kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile kubernetes.io/name: "KubeDNSUpstream" spec: ports: - name: dns port: 53
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 03:19:02 UTC 2024 - 5.3K bytes - Viewed (0) -
cluster/addons/metrics-server/resource-reader.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: system:metrics-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: [""] resources: - nodes/metrics verbs: - get - apiGroups: [""] resources: - pods - nodes verbs: - get - list - watch - apiGroups: ["apps"]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun May 26 01:57:01 UTC 2024 - 988 bytes - Viewed (0)