Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 29 for ready (0.23 sec)

  1. common-protos/k8s.io/api/core/v1/generated.proto

      // Service should disregard any indications of ready/not-ready.
      // The primary use case for setting this field is for a StatefulSet's Headless Service to
      // propagate SRV DNS records for its Pods for the purpose of peer discovery.
      // The Kubernetes controllers that generate Endpoints and EndpointSlice resources for
      // Services interpret this to mean that all endpoints are considered "ready" even if the
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 255.8K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.16.md

    - Node labels `beta.kubernetes.io/metadata-proxy-ready`, `beta.kubernetes.io/metadata-proxy-ready` and `beta.kubernetes.io/kube-proxy-ds-ready` are no longer added on new nodes.
      - ip-mask-agent addon starts to use the label `node.kubernetes.io/masq-agent-ds-ready` instead of `beta.kubernetes.io/masq-agent-ds-ready` as its node selector.
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Thu Feb 11 10:00:57 GMT 2021
    - 345.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.21.md

    - The e2e suite can be instructed not to wait for pods in kube-system to be ready or for all nodes to be ready by passing `--allowed-not-ready-nodes=-1` when invoking the e2e.test program. This allows callers to run subsets of the e2e suite in scenarios other than perfectly healthy clusters. ([#98781](https://github.com/kubernetes/kubernetes/pull/98781), [@...
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Fri Oct 14 07:03:14 GMT 2022
    - 367.3K bytes
    - Viewed (4)
  4. CHANGELOG/CHANGELOG-1.14.md

        * setting `ENABLE_METADATA_CONCEALMENT=true` in kube-up will now set a `cloud.google.com/metadata-proxy-ready=true` label on new nodes. In v1.16, the metadata proxy add-on will switch to using that label as a node selector.
        * setting `KUBE_PROXY_DAEMONSET=true` in kube-up will now set a `node.kubernetes.io/kube-proxy-ds-ready=true` label on new nodes. In v1.16, the kube-proxy daemonset add-on will switch to using that label as a node selector.
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Mon Jun 14 22:06:39 GMT 2021
    - 271.5K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.6.md

        kubelet does not start pods that require networking before
        [networking is ready](https://github.com/kubernetes/kubernetes/issues/43014).
        This change may require changes to clients that gate pod creation and/or
        scheduling on the node condition `type` `Ready` `status` being `True` for pods
        that need to run prior to the network being ready.
    * **Enhance Kubelet QoS**:
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.18.md

    - Containers which specify a `startupProbe` but not a `readinessProbe` were previously considered "ready" before the `startupProbe` completed, but are now considered "not-ready". ([#92196](https://github.com/kubernetes/kubernetes/pull/92196), [@thockin](https://github.com/thockin)) [SIG Node]
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Wed Jun 16 17:18:28 GMT 2021
    - 373.2K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.25.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Thu Nov 16 11:30:31 GMT 2023
    - 419K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.22.md

    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Viewed (1)
  9. CHANGELOG/CHANGELOG-1.20.md

    - Add a `serving` and `terminating` condition to the EndpointSlice API.
      `serving` tracks the readiness of endpoints regardless of their terminating state. This is distinct from `ready` since `ready` is only true when pods are not terminating. 
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Wed Jan 19 21:05:45 GMT 2022
    - 409K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.23.md

    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Tue Feb 28 21:06:52 GMT 2023
    - 424.5K bytes
    - Viewed (0)
Back to top