Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for setpgid (0.35 sec)

  1. cluster/addons/dns/kube-dns/kube-dns.yaml.in

              mountPath: /etc/k8s/dns/dnsmasq-nanny
            securityContext:
              capabilities:
                drop:
                  - all
                add:
                  - NET_BIND_SERVICE
                  - SETGID
          - name: sidecar
            image: registry.k8s.io/dns/k8s-dns-sidecar:1.23.1
            livenessProbe:
              httpGet:
                path: /metrics
                port: 10054
                scheme: HTTP
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 03:19:02 UTC 2024
    - 7K bytes
    - Viewed (0)
  2. src/os/exec.go

    type Signal interface {
    	String() string
    	Signal() // to distinguish from other Stringers
    }
    
    // Getpid returns the process id of the caller.
    func Getpid() int { return syscall.Getpid() }
    
    // Getppid returns the process id of the caller's parent.
    func Getppid() int { return syscall.Getppid() }
    
    // FindProcess looks for a running process by its pid.
    //
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 10 22:06:47 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  3. cluster/addons/dns/kube-dns/kube-dns.yaml.sed

              mountPath: /etc/k8s/dns/dnsmasq-nanny
            securityContext:
              capabilities:
                drop:
                  - all
                add:
                  - NET_BIND_SERVICE
                  - SETGID
          - name: sidecar
            image: registry.k8s.io/dns/k8s-dns-sidecar:1.23.1
            livenessProbe:
              httpGet:
                path: /metrics
                port: 10054
                scheme: HTTP
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 03:19:02 UTC 2024
    - 7.1K bytes
    - Viewed (0)
  4. cluster/addons/dns/kube-dns/kube-dns.yaml.base

              mountPath: /etc/k8s/dns/dnsmasq-nanny
            securityContext:
              capabilities:
                drop:
                  - all
                add:
                  - NET_BIND_SERVICE
                  - SETGID
          - name: sidecar
            image: registry.k8s.io/dns/k8s-dns-sidecar:1.23.1
            livenessProbe:
              httpGet:
                path: /metrics
                port: 10054
                scheme: HTTP
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 03:19:02 UTC 2024
    - 7K bytes
    - Viewed (0)
  5. api/openapi-spec/v3/apis__batch__v1_openapi.json

                "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw----\n\nIf unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 485.4K bytes
    - Viewed (0)
  6. pkg/generated/openapi/zz_generated.openapi.go

    							Description: "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw----\n\nIf unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 3M bytes
    - Viewed (0)
  7. api/openapi-spec/swagger.json

              "description": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw----\n\nIf unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 3.1M bytes
    - Viewed (0)
Back to top