Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 11 for resourcequotas (0.47 sec)

  1. pkg/controller/resourcequota/resource_quota_controller.go

    	dirty := statusLimitsDirty || resourceQuota.Status.Hard == nil || resourceQuota.Status.Used == nil
    
    	used := v1.ResourceList{}
    	if resourceQuota.Status.Used != nil {
    		used = quota.Add(v1.ResourceList{}, resourceQuota.Status.Used)
    	}
    	hardLimits := quota.Add(v1.ResourceList{}, resourceQuota.Spec.Hard)
    
    	var errs []error
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 21.3K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    				rbacv1helpers.NewRule(Read...).Groups(legacyGroup).Resources("limitranges", "resourcequotas", "bindings", "events",
    					"pods/status", "resourcequotas/status", "namespaces/status", "replicationcontrollers/status", "pods/log").RuleOrDie(),
    				// read access to namespaces at the namespace scope means you can read *this* namespace.  This can be used as an
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  3. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml

      rules:
      - apiGroups:
        - '*'
        resources:
        - '*'
        verbs:
        - list
        - watch
      - apiGroups:
        - ""
        resources:
        - resourcequotas/status
        verbs:
        - update
      - apiGroups:
        - ""
        - events.k8s.io
        resources:
        - events
        verbs:
        - create
        - patch
        - update
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 26.6K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "resourcequota-controller"},
    		Rules: []rbacv1.PolicyRule{
    			// quota can count quota on anything for reconciliation, so it needs full viewing powers
    			rbacv1helpers.NewRule("list", "watch").Groups("*").Resources("*").RuleOrDie(),
    			rbacv1helpers.NewRule("update").Groups(legacyGroup).Resources("resourcequotas/status").RuleOrDie(),
    			eventsRule(),
    		},
    	})
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  5. cmd/kube-controller-manager/app/core.go

    		name:     names.ResourceQuotaController,
    		aliases:  []string{"resourcequota"},
    		initFunc: startResourceQuotaController,
    	}
    }
    
    func startResourceQuotaController(ctx context.Context, controllerContext ControllerContext, controllerName string) (controller.Interface, bool, error) {
    	resourceQuotaControllerClient := controllerContext.ClientBuilder.ClientOrDie("resourcequota-controller")
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 10 08:42:31 UTC 2024
    - 39K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/admission/plugin/resourcequota/controller.go

    		match, err := evaluator.Matches(&resourceQuota, inputObject)
    		if err != nil {
    			klog.ErrorS(err, "Error occurred while matching resource quota against input object",
    				"resourceQuota", resourceQuota)
    			return quotas, err
    		}
    		if !match {
    			continue
    		}
    
    		hardResources := quota.ResourceNames(resourceQuota.Status.Hard)
    		restrictedResources := evaluator.MatchingResources(hardResources)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 25.8K bytes
    - Viewed (0)
  7. cluster/gce/config-default.sh

    # modification is overwritten.
    ADMISSION_CONTROL="${ADMISSION_CONTROL},MutatingAdmissionWebhook,ValidatingAdmissionWebhook"
    
    # ResourceQuota must come last, or a creation is recorded, but the pod was forbidden.
    ADMISSION_CONTROL="${ADMISSION_CONTROL},ResourceQuota"
    
    # Optional: if set to true kube-up will automatically check for existing resources and clean them up.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 16 20:16:32 UTC 2024
    - 26.9K bytes
    - Viewed (0)
  8. cluster/gce/config-test.sh

      # ResourceQuota must come last, or a creation is recorded, but the pod may be forbidden.
      ADMISSION_CONTROL="${ADMISSION_CONTROL},MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
    else
      ADMISSION_CONTROL=${KUBE_ADMISSION_CONTROL}
    fi
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 17:20:24 UTC 2024
    - 29.8K bytes
    - Viewed (0)
  9. pkg/controller/resourcequota/resource_quota_monitor.go

    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    See the License for the specific language governing permissions and
    limitations under the License.
    */
    
    package resourcequota
    
    import (
    	"context"
    	"fmt"
    	"sync"
    	"time"
    
    	"k8s.io/klog/v2"
    
    	"k8s.io/apimachinery/pkg/api/meta"
    	"k8s.io/apimachinery/pkg/runtime/schema"
    	utilerrors "k8s.io/apimachinery/pkg/util/errors"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  10. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:resourcequota-controller
      subjects:
      - kind: ServiceAccount
        name: resourcequota-controller
        namespace: kube-system
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 16.9K bytes
    - Viewed (0)
Back to top