Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 506 for nokubelet (0.23 sec)

  1. cmd/kubeadm/app/phases/kubelet/kubelet.go

    	if err != nil {
    		fmt.Println("[kubelet-start] No supported init system detected, won't make sure the kubelet is running properly.")
    		return
    	}
    
    	if !initSystem.ServiceExists(kubeadmconstants.Kubelet) {
    		fmt.Println("[kubelet-start] Couldn't detect a kubelet service, can't make sure the kubelet is running properly.")
    	}
    
    	// This runs "systemctl daemon-reload && systemctl restart kubelet"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jan 15 16:01:35 UTC 2022
    - 3.3K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/cmd/phases/init/kubelet.go

    		Name:    "kubelet-start",
    		Short:   "Write kubelet settings and (re)start the kubelet",
    		Long:    "Write a file with KubeletConfiguration and an environment file with node specific kubelet settings, and then (re)start kubelet.",
    		Example: kubeletStartPhaseExample,
    		Run:     runKubeletStart,
    		InheritFlags: []string{
    			options.CfgPath,
    			options.ImageRepository,
    			options.NodeCRISocket,
    			options.NodeName,
    			options.Patches,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Aug 20 09:18:00 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/componentconfigs/kubelet.go

    	"k8s.io/klog/v2"
    	kubeletconfig "k8s.io/kubelet/config/v1beta1"
    	"k8s.io/utils/ptr"
    
    	kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
    	kubeadmapiv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3"
    	"k8s.io/kubernetes/cmd/kubeadm/app/constants"
    )
    
    const (
    	// KubeletGroup is a pointer to the used API group name for the kubelet config
    	KubeletGroup = kubeletconfig.GroupName
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 01 07:10:31 UTC 2024
    - 8K bytes
    - Viewed (0)
  4. cmd/kubelet/kubelet.go

    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    See the License for the specific language governing permissions and
    limitations under the License.
    */
    
    // The kubelet binary is responsible for maintaining a set of containers on a particular host VM.
    // It syncs data from both configuration file(s) as well as from a quorum of etcd servers.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Apr 25 20:06:05 UTC 2023
    - 1.4K bytes
    - Viewed (0)
  5. cluster/addons/rbac/legacy-kubelet-user/kubelet-binding.yaml

    # The GKE environments don't have kubelets with certificates that
    # identify the system:nodes group.  They use the kubelet identity
    # TODO: remove this once new nodes are granted individual identities and the
    # NodeAuthorizer is enabled.
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-cluster-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 565 bytes
    - Viewed (0)
  6. cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml

    kind: ClusterRoleBinding
    metadata:
      name: kubelet-cluster-admin
      labels:
        addonmanager.kubernetes.io/mode: EnsureExists
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node
    subjects: []
    ---
    # This is required so that new clusters still have bootstrap permissions
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-bootstrap
      labels:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 782 bytes
    - Viewed (0)
  7. cluster/addons/rbac/kubelet-cert-rotation/kubelet-certificate-management.yaml

    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: gce:beta:kubelet-certificate-bootstrap
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
      name: kubelet
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: gce:beta:kubelet-certificate-rotation
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 1.4K bytes
    - Viewed (0)
  8. cluster/addons/rbac/kubelet-api-auth/kubelet-api-admin-role.yaml

    # This role allows full access to the kubelet API
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: kubelet-api-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    rules:
    - apiGroups:
      - ""
      resources:
      - nodes/proxy
      - nodes/log
      - nodes/stats
      - nodes/metrics
      verbs:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Oct 21 18:57:07 UTC 2022
    - 323 bytes
    - Viewed (0)
  9. pkg/controller/certificates/signer/testdata/kubelet.csr

    Mike Danese <******@****.***> 1494279885 -0700
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 23 22:25:58 UTC 2017
    - 408 bytes
    - Viewed (0)
  10. cluster/addons/rbac/kubelet-api-auth/kube-apiserver-kubelet-api-admin-binding.yaml

    # This binding gives the kube-apiserver user full access to the kubelet API
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kube-apiserver-kubelet-api-admin
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: kubelet-api-admin
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 427 bytes
    - Viewed (0)
Back to top