- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 28 for check (0.06 sec)
-
CHANGELOG/CHANGELOG-1.20.md
- Kubeadm: allow the "certs check-expiration" command to not require the existence of the cluster CA key (ca.key file) when checking the expiration of managed certificates in kubeconfig files. ([#106927](https://github.com/kubernetes/kubernetes/pull/106927), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]
Registered: 2024-11-01 09:05 - Last Modified: 2022-01-19 21:05 - 409K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
- Upon successful authorization check, an impersonated user is added to the system:authenticated group. system:anonymous when impersonated is added to the system:unauthenticated group. ([#94410](https://github.com/kubernetes/kubernetes/pull/94410), [@tkashem](https://github.com/tkashem)) [SIG API Machinery and Testing]
Registered: 2024-11-01 09:05 - Last Modified: 2021-01-28 10:44 - 346.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.31.md
- Kubeadm: Added support during the preflight check "CreateJob" of "kubeadm upgrade" to check if there are no nodes where a Pod can be scheduled. If there are none, show a warning and skip this preflight check. This can happen in single node clusters where the only node was drained. ([#124503](https://github.com/kubernetes/kubernetes/pull/124503), [@neolit123](https://github.com/neolit123))...
Registered: 2024-11-01 09:05 - Last Modified: 2024-10-23 12:18 - 315.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
[overwrite of manual edits to GCP Health Checks](https://github.com/kubernetes/ingress/issues/842) managed by the GLBC Ingress Controller. This can cause the health checks to start failing, requiring you to reapply the manual edits. * This issue does not affect clusters that were already running Kubernetes v1.6.4 or higher. * This issue does not affect Health Checks that were left in the configuration
Registered: 2024-11-01 09:05 - Last Modified: 2020-12-24 02:28 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- Upon successful authorization check, an impersonated user is added to the system:authenticated group. system:anonymous when impersonated is added to the system:unauthenticated group. ([#94409](https://github.com/kubernetes/kubernetes/pull/94409), [@tkashem](https://github.com/tkashem)) [SIG API Machinery and Testing]
Registered: 2024-11-01 09:05 - Last Modified: 2021-06-16 17:18 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.27.md
- Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a `authorizer`
Registered: 2024-11-01 09:05 - Last Modified: 2024-07-17 07:48 - 466.3K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.9.md
* kubeadm: use the CRI for preflights checks ([#55055](https://github.com/kubernetes/kubernetes/pull/55055), [@runcom](https://github.com/runcom))
Registered: 2024-11-01 09:05 - Last Modified: 2021-11-16 10:46 - 313.7K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
winkernel mode. `--forward-healthcheck-vip`, if specified as true, health check traffic whose destination is service VIP will be forwarded to kube-proxy's healthcheck service. `--root-hnsendpoint-name` specifies the name of the hns endpoint for the root network namespace. This option enables the pass-through load balancers like Google's GCLB to correctly health check the backend services. Without this change, the health check packets is dropped, and Windows node will be considered to be unhealthy by...
Registered: 2024-11-01 09:05 - Last Modified: 2023-08-24 00:02 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.16.md
- kubeadm no longer performs IPVS checks as part of its preflight checks ([#81791](https://github.com/kubernetes/kubernetes/pull/81791), [@yastij](https://github.com/yastij)) - kubeadm: fix for HTTPProxy check for IPv6 addresses ([#82267](https://github.com/kubernetes/kubernetes/pull/82267), [@kad](https://github.com/kad))
Registered: 2024-11-01 09:05 - Last Modified: 2021-02-11 10:00 - 345.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
### Bug or Regression - Kubeadm: allow the "certs check-expiration" command to not require the existence of the cluster CA key (ca.key file) when checking the expiration of managed certificates in kubeconfig files. ([#106931](https://github.com/kubernetes/kubernetes/pull/106931), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]
Registered: 2024-11-01 09:05 - Last Modified: 2023-02-28 21:06 - 424.5K bytes - Viewed (0)