- Sort Score
- Result 10 results
- Languages All
Results 21 - 29 of 29 for namespace (0.55 sec)
-
CHANGELOG/CHANGELOG-1.25.md
- Return a warning when applying a `pod-security.kubernetes.io` label to a PodSecurity-exempted namespace. Stop including the `pod-security.kubernetes.io/exempt=namespace` audit annotation on namespace requests. ([#109680](https://github.com/kubernetes/kubernetes/pull/109680), [@tallclair](https://github.com/tallclair))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Nov 16 11:30:31 GMT 2023 - 419K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
* kubectl commands run inside a pod using a kubeconfig file now use the namespace specified in the kubeconfig file, instead of using the pod namespace. If no kubeconfig file is used, or the kubeconfig does not specify a namespace, the pod namespace is still used as a fallback. ([#44570](https://github.com/kubernetes/kubernetes/pull/44570), [@liggitt](https://github.com/liggitt))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.15.md
- The `system:aws-cloud-provider` cluster role, deprecated in v1.13, is no longer auto-created. Deployments using the AWS cloud provider should grant required permissions to the `aws-cloud-provider` service account in the `kube-system` namespace as part of deployment. ([#66635](https://github.com/kubernetes/kubernetes/pull/66635), [@wgliang](https://github.com/wgliang)) #### Azure
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 278.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.2.md
default). An example using curl: <code>curl -H "Content-Type: application/json" -XPOST -d '{"apiVersion":"v1","kind":"Namespace","metadata":{"name":"kube-system"}}' "[http://127.0.0.1:8080/api/v1/namespaces](http://127.0.0.1:8080/api/v1/namespaces)"</code> * The version of InfluxDB is bumped from 0.8 to 0.9 which means storage schema
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Fri Dec 04 06:36:19 GMT 2020 - 41.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.30.md
- When using `kubectl logs <pod-name>` and the pod is not found, the error message now includes the namespace. Previously, the message would be "Error from server (NotFound): pods "my-pod-name" not found". Now, it reflects the namespace in the message as follows: "Error from server (NotFound): pods "my-pod-name" not found in namespace "default"". ([#120111](https://github.com/kubernetes/kubernetes/pull/120111), [@newtondev](https://github.com/newtondev))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Wed Apr 17 17:56:15 GMT 2024 - 227.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
#### ThirdPartyResource If you use ThirdPartyResource objects, they have moved from being namespaced-scoped to be cluster-scoped. Before upgrading to 1.3.0, export and delete any existing ThirdPartyResource objects using a 1.2.x client: kubectl get thirdpartyresource --all-namespaces -o yaml > tprs.yaml kubectl delete -f tprs.yaml
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 84K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.14.md
- There is now support for collecting pod logs under `/var/log/pods/NAMESPACE_NAME_UID` to stackdriver with `k8s_pod` resource type. ([#74502](https://github.com/kubernetes/kubernetes/pull/74502), [@Random-Liu](https://github.com/Random-Liu))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.26.md
- Kubectl apply: warning that kubectl will ignore no-namespaced resource `pv & namespace` in a future release if the namespace is specified and allowlist is not specified. ([#110907](https://github.com/kubernetes/kubernetes/pull/110907), [@pacoxu](https://github.com/pacoxu))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Mar 14 16:24:51 GMT 2024 - 425.7K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- Added `UserNamespacesPodSecurityStandards` feature gate to enable user namespace support for Pod Security Standards. Enabling this feature will modify all Pod Security Standard rules to allow setting: `spec[.*].securityContext.[runAsNonRoot,runAsUser]`. This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled.
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Apr 16 21:41:06 GMT 2024 - 299.9K bytes - Viewed (1)