- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 108 for Reconciled (0.15 sec)
-
cluster/addons/dns/kube-dns/kube-dns.yaml.in
namespace: kube-system labels: k8s-app: kube-dns kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile spec: # replicas: not specified here: # 1. In order to make Addon Manager do not reconcile this replicas parameter. # 2. Default is 1. # 3. Will be tuned in real time if DNS horizontal auto-scaling is turned on. strategy: rollingUpdate: maxSurge: 10% maxUnavailable: 0
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 03:19:02 UTC 2024 - 7K bytes - Viewed (0) -
cluster/addons/metrics-server/metrics-server-deployment.yaml
apiVersion: v1 kind: ServiceAccount metadata: name: metrics-server namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- apiVersion: v1 kind: ConfigMap metadata: name: metrics-server-config namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: EnsureExists data: NannyConfiguration: |-
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 07:50:56 UTC 2024 - 3.6K bytes - Viewed (0) -
pkg/controller/nodelifecycle/node_lifecycle_controller.go
taintEvictionController = "taint-eviction-controller" ) // labelReconcileInfo lists Node labels to reconcile, and how to reconcile them. // primaryKey and secondaryKey are keys of labels to reconcile. // - If both keys exist, but their values don't match. Use the value from the // primaryKey as the source of truth to reconcile. // - If ensureSecondaryExists is true, and the secondaryKey does not
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 51.6K bytes - Viewed (0) -
pkg/webhooks/validation/controller/controller.go
return c } func (c *Controller) Reconcile(key types.NamespacedName) error { name := key.Name whc := c.webhooks.Get(name, "") scope := scope.WithLabels("webhook", name) // Stop early if webhook is not present, rather than attempting (and failing) to reconcile permanently // If the webhook is later added a new reconciliation request will trigger it to update
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 28 16:52:19 UTC 2024 - 11.3K bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/volume-snapshot-controller-deployment.yaml
--- kind: StatefulSet apiVersion: apps/v1 metadata: name: volume-snapshot-controller namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile spec: serviceName: "volume-snapshot-controller" replicas: 1 selector: matchLabels: app: volume-snapshot-controller template: metadata: labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 07:47:15 UTC 2024 - 758 bytes - Viewed (0) -
cmd/kube-apiserver/app/options/options.go
fs.BoolVar(&s.AllowPrivileged, "allow-privileged", s.AllowPrivileged, "If true, allow privileged containers. [default=false]") fs.StringVar(&s.EndpointReconcilerType, "endpoint-reconciler-type", s.EndpointReconcilerType, "Use an endpoint reconciler ("+strings.Join(reconcilers.AllTypes.Names(), ", ")+") master-count is deprecated, and will be removed in a future version.") // See #14282 for details on how to test/try this option out.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 12:19:56 UTC 2024 - 6.5K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies.yaml
kind: DaemonSet metadata: name: kube-network-policies namespace: kube-system labels: tier: node app: kube-network-policies k8s-app: kube-network-policies addonmanager.kubernetes.io/mode: Reconcile spec: selector: matchLabels: app: kube-network-policies template: metadata: labels: tier: node app: kube-network-policies k8s-app: kube-network-policies
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 25 14:27:59 UTC 2024 - 1.3K bytes - Viewed (0) -
cluster/gce/addons/konnectivity-agent/konnectivity-agent-ds.yaml
--- apiVersion: apps/v1 kind: DaemonSet metadata: labels: addonmanager.kubernetes.io/mode: Reconcile k8s-app: konnectivity-agent namespace: kube-system name: konnectivity-agent spec: selector: matchLabels: k8s-app: konnectivity-agent updateStrategy: type: RollingUpdate template: metadata: labels: k8s-app: konnectivity-agent spec:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 10:31:11 UTC 2024 - 2.4K bytes - Viewed (0) -
cni/pkg/nodeagent/informers.go
"istio.io/istio/pkg/monitoring" ) var ( eventTypeTag = monitoring.CreateLabel("type") EventTotals = monitoring.NewSum( "nodeagent_reconcile_events_total", "The total number of node agent reconcile events.", ) ) type K8sHandlers interface { GetPodIfAmbient(podName, podNamespace string) (*corev1.Pod, error) GetActiveAmbientPodSnapshot() []*corev1.Pod Start() } type InformerHandlers struct {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 21:31:35 UTC 2024 - 11.8K bytes - Viewed (0) -
cni/pkg/nodeagent/informers_test.go
types.MergePatchType, labelsPatch, metav1.PatchOptions{}) assert.NoError(t, err) // wait for another two update events // total 3 update at before unlabel point: 1. init ns reconcile 2. ns label reconcile 3. pod annotation update mt.Assert(EventTotals.Name(), map[string]string{"type": "update"}, monitortest.AtLeast(5)) waitForMockCalls() assertPodNotAnnotated(t, client, pod)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 05:10:23 UTC 2024 - 22.2K bytes - Viewed (0)