- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 29 for readn (0.07 sec)
-
CHANGELOG/CHANGELOG-1.21.md
- The e2e suite can be instructed not to wait for pods in kube-system to be ready or for all nodes to be ready by passing `--allowed-not-ready-nodes=-1` when invoking the e2e.test program. This allows callers to run subsets of the e2e suite in scenarios other than perfectly healthy clusters. ([#98781](https://github.com/kubernetes/kubernetes/pull/98781), [@...
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Fri Oct 14 07:03:14 UTC 2022 - 367.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- Containers which specify a `startupProbe` but not a `readinessProbe` were previously considered "ready" before the `startupProbe` completed, but are now considered "not-ready". ([#92196](https://github.com/kubernetes/kubernetes/pull/92196), [@thockin](https://github.com/thockin)) [SIG Node]
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
- [Node binaries](#node-binaries-7) - [Changelog since v1.17.8](#changelog-since-v1178) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-8) - [Bug or Regression](#bug-or-regression-7) - [Dependencies](#dependencies-8) - [Added](#added-8)
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Jan 28 10:44:33 UTC 2021 - 346.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.16.md
- Node labels `beta.kubernetes.io/metadata-proxy-ready`, `beta.kubernetes.io/metadata-proxy-ready` and `beta.kubernetes.io/kube-proxy-ds-ready` are no longer added on new nodes. - ip-mask-agent addon starts to use the label `node.kubernetes.io/masq-agent-ds-ready` instead of `beta.kubernetes.io/masq-agent-ds-ready` as its node selector.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Oct 23 20:13:20 UTC 2024 - 345.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
kubelet does not start pods that require networking before [networking is ready](https://github.com/kubernetes/kubernetes/issues/43014). This change may require changes to clients that gate pod creation and/or scheduling on the node condition `type` `Ready` `status` being `True` for pods that need to run prior to the network being ready. * **Enhance Kubelet QoS**:
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Mon May 06 09:23:20 UTC 2024 - 419.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Aug 24 00:02:43 UTC 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.14.md
* setting `ENABLE_METADATA_CONCEALMENT=true` in kube-up will now set a `cloud.google.com/metadata-proxy-ready=true` label on new nodes. In v1.16, the metadata proxy add-on will switch to using that label as a node selector. * setting `KUBE_PROXY_DAEMONSET=true` in kube-up will now set a `node.kubernetes.io/kube-proxy-ds-ready=true` label on new nodes. In v1.16, the kube-proxy daemonset add-on will switch to using that label as a node selector.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Mon Jun 14 22:06:39 UTC 2021 - 271.5K bytes - Viewed (0)