Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 34 for ready (0.04 seconds)

  1. CHANGELOG/CHANGELOG-1.16.md

    - Node labels `beta.kubernetes.io/metadata-proxy-ready`, `beta.kubernetes.io/metadata-proxy-ready` and `beta.kubernetes.io/kube-proxy-ds-ready` are no longer added on new nodes.
      - ip-mask-agent addon starts to use the label `node.kubernetes.io/masq-agent-ds-ready` instead of `beta.kubernetes.io/masq-agent-ds-ready` as its node selector.
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Wed Oct 23 20:13:20 GMT 2024
    - 345.2K bytes
    - Click Count (0)
  2. CHANGELOG/CHANGELOG-1.21.md

    - The e2e suite can be instructed not to wait for pods in kube-system to be ready or for all nodes to be ready by passing `--allowed-not-ready-nodes=-1` when invoking the e2e.test program. This allows callers to run subsets of the e2e suite in scenarios other than perfectly healthy clusters. ([#98781](https://github.com/kubernetes/kubernetes/pull/98781), [@...
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Fri Oct 14 07:03:14 GMT 2022
    - 367.3K bytes
    - Click Count (0)
  3. CHANGELOG/CHANGELOG-1.14.md

        * setting `ENABLE_METADATA_CONCEALMENT=true` in kube-up will now set a `cloud.google.com/metadata-proxy-ready=true` label on new nodes. In v1.16, the metadata proxy add-on will switch to using that label as a node selector.
        * setting `KUBE_PROXY_DAEMONSET=true` in kube-up will now set a `node.kubernetes.io/kube-proxy-ds-ready=true` label on new nodes. In v1.16, the kube-proxy daemonset add-on will switch to using that label as a node selector.
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Mon Jun 14 22:06:39 GMT 2021
    - 271.5K bytes
    - Click Count (0)
  4. CHANGELOG/CHANGELOG-1.6.md

        kubelet does not start pods that require networking before
        [networking is ready](https://github.com/kubernetes/kubernetes/issues/43014).
        This change may require changes to clients that gate pod creation and/or
        scheduling on the node condition `type` `Ready` `status` being `True` for pods
        that need to run prior to the network being ready.
    * **Enhance Kubelet QoS**:
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Click Count (0)
  5. CHANGELOG/CHANGELOG-1.30.md

    - When initializing nodes using external cloud-providers, the process now waits for the providerID value to be available before declaring the node ready. This ensures that nodes are not marked as Ready prematurely due to communication errors with the cloud-provider. The providerID and zone labels are necessary for integrations such as load balancers to function correctly. Users can choose to opt out of this behavior by setting...
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Wed Jun 18 18:59:10 GMT 2025
    - 398.1K bytes
    - Click Count (0)
  6. CHANGELOG/CHANGELOG-1.18.md

    - Containers which specify a `startupProbe` but not a `readinessProbe` were previously considered "ready" before the `startupProbe` completed, but are now considered "not-ready". ([#92196](https://github.com/kubernetes/kubernetes/pull/92196), [@thockin](https://github.com/thockin)) [SIG Node]
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Wed Jun 16 17:18:28 GMT 2021
    - 373.2K bytes
    - Click Count (0)
  7. CHANGELOG/CHANGELOG-1.13.md

      - The deprecated `--etcd-quorum-read` flag has been removed. Quorum reads are now always enabled when fetching data from etcd. Remove the `--etcd-quorum-read` flag from kube-apiserver invocations before upgrading.
    - kube-controller-manager
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu May 05 13:44:43 GMT 2022
    - 273.1K bytes
    - Click Count (0)
  8. CHANGELOG/CHANGELOG-1.25.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Mon May 06 09:23:20 GMT 2024
    - 419.1K bytes
    - Click Count (0)
  9. CHANGELOG/CHANGELOG-1.22.md

    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Click Count (0)
  10. CHANGELOG/CHANGELOG-1.23.md

    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Tue Feb 28 21:06:52 GMT 2023
    - 424.5K bytes
    - Click Count (0)
Back to Top