- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 155 for Reconciled (0.16 sec)
-
cmd/kube-apiserver/app/options/options.go
fs.BoolVar(&s.AllowPrivileged, "allow-privileged", s.AllowPrivileged, "If true, allow privileged containers. [default=false]") fs.StringVar(&s.EndpointReconcilerType, "endpoint-reconciler-type", s.EndpointReconcilerType, "Use an endpoint reconciler ("+strings.Join(reconcilers.AllTypes.Names(), ", ")+") master-count is deprecated, and will be removed in a future version.") // See #14282 for details on how to test/try this option out.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 12:19:56 UTC 2024 - 6.5K bytes - Viewed (0) -
cluster/addons/calico-policy-controller/calico-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: calico labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico subjects: - kind: ServiceAccount name: calico
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 303 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: typha-cpha namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: typha-cpha subjects: - kind: ServiceAccount name: typha-cpha
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 332 bytes - Viewed (0) -
cluster/addons/metrics-server/auth-delegator.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: metrics-server:system:auth-delegator labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 398 bytes - Viewed (0) -
cluster/addons/cluster-loadbalancing/glbc/default-svc.yaml
name: default-http-backend namespace: kube-system labels: k8s-app: glbc kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile kubernetes.io/name: "GLBCDefaultBackend" spec: # The default backend must be of type NodePort. type: NodePort ports: - port: 80 targetPort: 8080 protocol: TCP name: http
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Feb 25 00:53:12 UTC 2017 - 577 bytes - Viewed (0) -
cluster/addons/node-problem-detector/kubelet-user-standalone/npd-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-user-npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 08 22:50:41 UTC 2019 - 389 bytes - Viewed (0) -
pkg/controlplane/reconcilers/doc.go
See the License for the specific language governing permissions and limitations under the License. */ // Package reconcilers provides objects for managing the list of active masters. // NOTE: The Lease reconciler is not the intended way for any apiserver other // than kube-apiserver to accomplish the task of Endpoint registration. This is // a special case for the time being.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Sep 02 17:48:26 UTC 2020 - 868 bytes - Viewed (0) -
cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml
# This is required so that new clusters still have bootstrap permissions apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-bootstrap labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-bootstrapper subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 782 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml
kind: Deployment apiVersion: apps/v1 metadata: name: calico-typha-vertical-autoscaler namespace: kube-system labels: k8s-app: calico-typha-autoscaler addonmanager.kubernetes.io/mode: Reconcile spec: replicas: 1 selector: matchLabels: k8s-app: calico-typha-autoscaler template: metadata: labels: k8s-app: calico-typha-autoscaler spec:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 31 14:16:53 UTC 2022 - 1K bytes - Viewed (0) -
cluster/gce/addons/admission-resource-quota-critical-pods/resource-quota.yaml
apiVersion: v1 kind: ResourceQuota metadata: name: gcp-critical-pods namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile spec: hard: pods: "1000000000" scopeSelector: matchExpressions: - operator : In scopeName: PriorityClass
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jul 17 13:52:19 UTC 2020 - 644 bytes - Viewed (0)