- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 30 for ready (0.05 sec)
-
common-protos/k8s.io/api/core/v1/generated.proto
// Service should disregard any indications of ready/not-ready. // The primary use case for setting this field is for a StatefulSet's Headless Service to // propagate SRV DNS records for its Pods for the purpose of peer discovery. // The Kubernetes controllers that generate Endpoints and EndpointSlice resources for // Services interpret this to mean that all endpoints are considered "ready" even if the
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.16.md
- Node labels `beta.kubernetes.io/metadata-proxy-ready`, `beta.kubernetes.io/metadata-proxy-ready` and `beta.kubernetes.io/kube-proxy-ds-ready` are no longer added on new nodes. - ip-mask-agent addon starts to use the label `node.kubernetes.io/masq-agent-ds-ready` instead of `beta.kubernetes.io/masq-agent-ds-ready` as its node selector.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 11 10:00:57 UTC 2021 - 345.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
kubelet does not start pods that require networking before [networking is ready](https://github.com/kubernetes/kubernetes/issues/43014). This change may require changes to clients that gate pod creation and/or scheduling on the node condition `type` `Ready` `status` being `True` for pods that need to run prior to the network being ready. * **Enhance Kubelet QoS**:
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- Containers which specify a `startupProbe` but not a `readinessProbe` were previously considered "ready" before the `startupProbe` completed, but are now considered "not-ready". ([#92196](https://github.com/kubernetes/kubernetes/pull/92196), [@thockin](https://github.com/thockin)) [SIG Node]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.14.md
* setting `ENABLE_METADATA_CONCEALMENT=true` in kube-up will now set a `cloud.google.com/metadata-proxy-ready=true` label on new nodes. In v1.16, the metadata proxy add-on will switch to using that label as a node selector. * setting `KUBE_PROXY_DAEMONSET=true` in kube-up will now set a `node.kubernetes.io/kube-proxy-ds-ready=true` label on new nodes. In v1.16, the kube-proxy daemonset add-on will switch to using that label as a node selector.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Mon Jun 14 22:06:39 UTC 2021 - 271.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.21.md
- The e2e suite can be instructed not to wait for pods in kube-system to be ready or for all nodes to be ready by passing `--allowed-not-ready-nodes=-1` when invoking the e2e.test program. This allows callers to run subsets of the e2e suite in scenarios other than perfectly healthy clusters. ([#98781](https://github.com/kubernetes/kubernetes/pull/98781), [@...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Fri Oct 14 07:03:14 UTC 2022 - 367.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.30.md
- When initializing nodes using external cloud-providers, the process now waits for the providerID value to be available before declaring the node ready. This ensures that nodes are not marked as Ready prematurely due to communication errors with the cloud-provider. The providerID and zone labels are necessary for integrations such as load balancers to function correctly. Users can choose to opt out of this behavior by setting...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:40:14 UTC 2024 - 309.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Mon May 06 09:23:20 UTC 2024 - 419.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0)