- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 511 for kubelet_ (0.18 sec)
-
pkg/kubelet/metrics/metrics_test.go
limitations under the License. */ package metrics import ( "os" "testing" "k8s.io/component-base/metrics/testutil" ) const imagePullDurationKey = "kubelet_" + ImagePullDurationKey func TestImagePullDurationMetric(t *testing.T) { t.Run("register image pull duration", func(t *testing.T) { Register() defer clearMetrics()
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Feb 08 00:30:31 UTC 2024 - 1.9K bytes - Viewed (0) -
cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml
# The GKE environments don't have kubelets with certificates that # identify the system:nodes group. They use the kubelet identity # TODO: remove this once new nodes are granted individual identities and the # NodeAuthorizer is enabled. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-cluster-admin labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 565 bytes - Viewed (0) -
cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml
# This is required so that old clusters don't remove required bindings for 1.5 # kubelets to function. apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-cluster-admin labels: addonmanager.kubernetes.io/mode: EnsureExists roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node subjects: [] --- # This is required so that new clusters still have bootstrap permissions
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 782 bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubelet/kubelet.go
if err != nil { fmt.Println("[kubelet-start] No supported init system detected, won't make sure the kubelet is running properly.") return } if !initSystem.ServiceExists(kubeadmconstants.Kubelet) { fmt.Println("[kubelet-start] Couldn't detect a kubelet service, can't make sure the kubelet is running properly.") } // This runs "systemctl daemon-reload && systemctl restart kubelet"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jan 15 16:01:35 UTC 2022 - 3.3K bytes - Viewed (0) -
cmd/kubeadm/app/cmd/phases/init/kubelet.go
Name: "kubelet-start", Short: "Write kubelet settings and (re)start the kubelet", Long: "Write a file with KubeletConfiguration and an environment file with node specific kubelet settings, and then (re)start kubelet.", Example: kubeletStartPhaseExample, Run: runKubeletStart, InheritFlags: []string{ options.CfgPath, options.ImageRepository, options.NodeCRISocket, options.NodeName, options.Patches,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Aug 20 09:18:00 UTC 2023 - 3.2K bytes - Viewed (0) -
cmd/kubeadm/app/componentconfigs/kubelet.go
"k8s.io/klog/v2" kubeletconfig "k8s.io/kubelet/config/v1beta1" "k8s.io/utils/ptr" kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm" kubeadmapiv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3" "k8s.io/kubernetes/cmd/kubeadm/app/constants" ) const ( // KubeletGroup is a pointer to the used API group name for the kubelet config KubeletGroup = kubeletconfig.GroupName
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 07:10:31 UTC 2024 - 8K bytes - Viewed (0) -
cmd/kubelet/kubelet.go
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ // The kubelet binary is responsible for maintaining a set of containers on a particular host VM. // It syncs data from both configuration file(s) as well as from a quorum of etcd servers.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Apr 25 20:06:05 UTC 2023 - 1.4K bytes - Viewed (0) -
cluster/addons/rbac/kubelet-cert-rotation/kubelet-certificate-management.yaml
roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: gce:beta:kubelet-certificate-bootstrap subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: kubelet --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: gce:beta:kubelet-certificate-rotation labels: addonmanager.kubernetes.io/mode: Reconcile roleRef:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 1.4K bytes - Viewed (0) -
cluster/addons/rbac/kubelet-api-auth/kubelet-api-admin-role.yaml
# This role allows full access to the kubelet API apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: kubelet-api-admin labels: addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: - "" resources: - nodes/proxy - nodes/log - nodes/stats - nodes/metrics verbs:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 21 18:57:07 UTC 2022 - 323 bytes - Viewed (0) -
pkg/controller/certificates/signer/testdata/kubelet.csr
Mike Danese <******@****.***> 1494279885 -0700
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 23 22:25:58 UTC 2017 - 408 bytes - Viewed (0)