- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 29 for ready (0.23 sec)
-
common-protos/k8s.io/api/core/v1/generated.proto
// Service should disregard any indications of ready/not-ready. // The primary use case for setting this field is for a StatefulSet's Headless Service to // propagate SRV DNS records for its Pods for the purpose of peer discovery. // The Kubernetes controllers that generate Endpoints and EndpointSlice resources for // Services interpret this to mean that all endpoints are considered "ready" even if the
Plain Text - Registered: Wed Apr 24 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 255.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.16.md
- Node labels `beta.kubernetes.io/metadata-proxy-ready`, `beta.kubernetes.io/metadata-proxy-ready` and `beta.kubernetes.io/kube-proxy-ds-ready` are no longer added on new nodes. - ip-mask-agent addon starts to use the label `node.kubernetes.io/masq-agent-ds-ready` instead of `beta.kubernetes.io/masq-agent-ds-ready` as its node selector.
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Thu Feb 11 10:00:57 GMT 2021 - 345.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.21.md
- The e2e suite can be instructed not to wait for pods in kube-system to be ready or for all nodes to be ready by passing `--allowed-not-ready-nodes=-1` when invoking the e2e.test program. This allows callers to run subsets of the e2e suite in scenarios other than perfectly healthy clusters. ([#98781](https://github.com/kubernetes/kubernetes/pull/98781), [@...
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Fri Oct 14 07:03:14 GMT 2022 - 367.3K bytes - Viewed (4) -
CHANGELOG/CHANGELOG-1.14.md
* setting `ENABLE_METADATA_CONCEALMENT=true` in kube-up will now set a `cloud.google.com/metadata-proxy-ready=true` label on new nodes. In v1.16, the metadata proxy add-on will switch to using that label as a node selector. * setting `KUBE_PROXY_DAEMONSET=true` in kube-up will now set a `node.kubernetes.io/kube-proxy-ds-ready=true` label on new nodes. In v1.16, the kube-proxy daemonset add-on will switch to using that label as a node selector.
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
kubelet does not start pods that require networking before [networking is ready](https://github.com/kubernetes/kubernetes/issues/43014). This change may require changes to clients that gate pod creation and/or scheduling on the node condition `type` `Ready` `status` being `True` for pods that need to run prior to the network being ready. * **Enhance Kubelet QoS**:
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- Containers which specify a `startupProbe` but not a `readinessProbe` were previously considered "ready" before the `startupProbe` completed, but are now considered "not-ready". ([#92196](https://github.com/kubernetes/kubernetes/pull/92196), [@thockin](https://github.com/thockin)) [SIG Node]
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Wed Jun 16 17:18:28 GMT 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Thu Nov 16 11:30:31 GMT 2023 - 419K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.20.md
- Add a `serving` and `terminating` condition to the EndpointSlice API. `serving` tracks the readiness of endpoints regardless of their terminating state. This is distinct from `ready` since `ready` is only true when pods are not terminating.
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Wed Jan 19 21:05:45 GMT 2022 - 409K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Viewed (0)