- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for Compacted (0.2 sec)
-
CHANGELOG/CHANGELOG-1.10.md
### Action Required * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ``` ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 341.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.12.md
* ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 293.8K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.17.md
* Conformance tests may now include disruptive tests. If you are running tests against a live cluster, consider skipping those tests tagged as `Disruptive` to avoid non-test workloads being impacted. Be aware, skipping any conformance tests (even disruptive ones) will make the results ineligible for consideration for the CNCF Certified Kubernetes program. ([#82664](https://github.com/kubernetes/kubernetes/pull/82664), [@johnSchnake](https:/...
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Jan 28 10:44:33 GMT 2021 - 346.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.13.md
* [IPVS] Introduces flag ipvs-strict-arp to configure stricter ARP sysctls, defaulting to false to preserve existing behaviors. This was enabled by default in 1.13.0, which impacted a few CNI plugins. ([#75295](https://github.com/kubernetes/kubernetes/pull/75295), [@lbernail](https://github.com/lbernail))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 273.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.11.md
### Action Required * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This issue has been rated low and assigned CVE-2021-25749 **Am I vulnerable?** All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted **Affected Versions**: - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 **How do I mitigate this vulnerability?**
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This issue has been rated low and assigned CVE-2021-25749 ### Am I vulnerable? All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted #### Affected Versions - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 ### How do I mitigate this vulnerability?
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.24.md
This issue has been rated low and assigned CVE-2021-25749 ### Am I vulnerable? All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted #### Affected Versions - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 ### How do I mitigate this vulnerability?
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.19.md
unschedulable from the candidate nodes. The service load balancer exclusion label should be used instead. Users upgrading from 1.18 who have cordoned nodes should set the `node.kubernetes.io/exclude-from-external-load-balancers` label on the impacted nodes before upgrading if they wish those nodes to remain excluded from service load balancers. ([#90823](https://github.com/kubernetes/kubernetes/pull/90823), [@smarterclayton](https://github.com/smarterclayton)) [SIG Apps, Cloud Provider and Network]...
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Wed Jan 05 05:42:32 GMT 2022 - 489.7K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.15.md
- Introduced the flag `--ipvs-strict-arp` to configure stricter ARP sysctls, defaulting to false to preserve existing behaviors. This was enabled by default in 1.13.0, which impacted a few CNI plugins. ([#75295](https://github.com/kubernetes/kubernetes/pull/75295), [@lbernail](https://github.com/lbernail))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 278.9K bytes - Viewed (0)