- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for resourcequotas (0.47 sec)
-
pkg/controller/resourcequota/resource_quota_controller.go
dirty := statusLimitsDirty || resourceQuota.Status.Hard == nil || resourceQuota.Status.Used == nil used := v1.ResourceList{} if resourceQuota.Status.Used != nil { used = quota.Add(v1.ResourceList{}, resourceQuota.Status.Used) } hardLimits := quota.Add(v1.ResourceList{}, resourceQuota.Spec.Hard) var errs []error
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 21.3K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
rbacv1helpers.NewRule(Read...).Groups(legacyGroup).Resources("limitranges", "resourcequotas", "bindings", "events", "pods/status", "resourcequotas/status", "namespaces/status", "replicationcontrollers/status", "pods/log").RuleOrDie(), // read access to namespaces at the namespace scope means you can read *this* namespace. This can be used as an
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml
rules: - apiGroups: - '*' resources: - '*' verbs: - list - watch - apiGroups: - "" resources: - resourcequotas/status verbs: - update - apiGroups: - "" - events.k8s.io resources: - events verbs: - create - patch - update
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 26.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "resourcequota-controller"}, Rules: []rbacv1.PolicyRule{ // quota can count quota on anything for reconciliation, so it needs full viewing powers rbacv1helpers.NewRule("list", "watch").Groups("*").Resources("*").RuleOrDie(), rbacv1helpers.NewRule("update").Groups(legacyGroup).Resources("resourcequotas/status").RuleOrDie(), eventsRule(), }, })
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
cmd/kube-controller-manager/app/core.go
name: names.ResourceQuotaController, aliases: []string{"resourcequota"}, initFunc: startResourceQuotaController, } } func startResourceQuotaController(ctx context.Context, controllerContext ControllerContext, controllerName string) (controller.Interface, bool, error) { resourceQuotaControllerClient := controllerContext.ClientBuilder.ClientOrDie("resourcequota-controller")
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 10 08:42:31 UTC 2024 - 39K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/resourcequota/controller.go
match, err := evaluator.Matches(&resourceQuota, inputObject) if err != nil { klog.ErrorS(err, "Error occurred while matching resource quota against input object", "resourceQuota", resourceQuota) return quotas, err } if !match { continue } hardResources := quota.ResourceNames(resourceQuota.Status.Hard) restrictedResources := evaluator.MatchingResources(hardResources)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 25.8K bytes - Viewed (0) -
cluster/gce/config-default.sh
# modification is overwritten. ADMISSION_CONTROL="${ADMISSION_CONTROL},MutatingAdmissionWebhook,ValidatingAdmissionWebhook" # ResourceQuota must come last, or a creation is recorded, but the pod was forbidden. ADMISSION_CONTROL="${ADMISSION_CONTROL},ResourceQuota" # Optional: if set to true kube-up will automatically check for existing resources and clean them up.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 16 20:16:32 UTC 2024 - 26.9K bytes - Viewed (0) -
cluster/gce/config-test.sh
# ResourceQuota must come last, or a creation is recorded, but the pod may be forbidden. ADMISSION_CONTROL="${ADMISSION_CONTROL},MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota" else ADMISSION_CONTROL=${KUBE_ADMISSION_CONTROL} fi
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 17:20:24 UTC 2024 - 29.8K bytes - Viewed (0) -
pkg/controller/resourcequota/resource_quota_monitor.go
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package resourcequota import ( "context" "fmt" "sync" "time" "k8s.io/klog/v2" "k8s.io/apimachinery/pkg/api/meta" "k8s.io/apimachinery/pkg/runtime/schema" utilerrors "k8s.io/apimachinery/pkg/util/errors"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 11.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:resourcequota-controller subjects: - kind: ServiceAccount name: resourcequota-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0)