- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 197 for Cloud (0.16 sec)
-
pkg/controller/nodeipam/nolegacyprovider.go
clientset "k8s.io/client-go/kubernetes" cloudprovider "k8s.io/cloud-provider" ) type fakeController struct { } func (f *fakeController) Run(ctx context.Context) { <-ctx.Done() } func createLegacyIPAM( ctx context.Context, ic *Controller, nodeInformer coreinformers.NodeInformer, cloud cloudprovider.Interface, kubeClient clientset.Interface, clusterCIDRs []*net.IPNet,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 13:03:53 UTC 2024 - 1.2K bytes - Viewed (0) -
api/api-rules/violation_exceptions.list
API rule violation: names_match,k8s.io/cloud-provider/config/v1alpha1,CloudControllerManagerConfiguration,Generic API rule violation: names_match,k8s.io/cloud-provider/config/v1alpha1,CloudControllerManagerConfiguration,KubeCloudShared API rule violation: names_match,k8s.io/cloud-provider/config/v1alpha1,CloudControllerManagerConfiguration,NodeController
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 27 02:59:09 UTC 2024 - 29.9K bytes - Viewed (0) -
cmd/kube-controller-manager/app/core.go
// Cannot run cloud ipam controller if cloud provider is nil (--cloud-provider not set or set to 'external') if controllerContext.Cloud == nil { return nil, false, errors.New("--cidr-allocator-type is set to 'CloudAllocator' but cloud provider is not configured") } // As part of the removal of all the cloud providers from kubernetes, this support will be removed as well
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 10 08:42:31 UTC 2024 - 39K bytes - Viewed (0) -
build/pause/cloudbuild.yaml
# See https://cloud.google.com/cloud-build/docs/build-config timeout: 1200s options: substitution_option: ALLOW_LOOSE machineType: 'N1_HIGHCPU_8' steps: - name: 'gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20240523-a15ad90fc9@sha256:bb04162508c2c61637eae700a0d8e8c8be8f2d4c831d2b75e59db2d4dd6cf75d' entrypoint: 'bash' dir: ./build/pause env: - DOCKER_CLI_EXPERIMENTAL=enabled - REGISTRY=gcr.io/$PROJECT_ID
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 20:51:40 UTC 2024 - 655 bytes - Viewed (0) -
pkg/controller/nodeipam/ipam/cidr_allocator.go
RangeAllocatorType CIDRAllocatorType = "RangeAllocator" // CloudAllocatorType is the allocator that uses cloud platform // support to do node CIDR range allocations. CloudAllocatorType CIDRAllocatorType = "CloudAllocator" // IPAMFromClusterAllocatorType uses the ipam controller sync'ing the node // CIDR range allocations from the cluster to the cloud. IPAMFromClusterAllocatorType = "IPAMFromCluster"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 13:03:57 UTC 2024 - 5.3K bytes - Viewed (0) -
pkg/kubelet/kubelet_node_status.go
} node.ObjectMeta.Labels[k] = v } if kl.providerID != "" { node.Spec.ProviderID = kl.providerID } if kl.cloud != nil { instances, ok := kl.cloud.Instances() if !ok { return nil, fmt.Errorf("failed to get instances from cloud provider") } // TODO: We can't assume that the node has credentials to talk to the // cloudprovider from arbitrary nodes. At most, we should talk to a
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 04 06:25:43 UTC 2024 - 31.1K bytes - Viewed (0) -
pkg/kubelet/nodestatus/setters.go
"k8s.io/apimachinery/pkg/util/errors" utilnet "k8s.io/apimachinery/pkg/util/net" utilfeature "k8s.io/apiserver/pkg/util/feature" cloudprovider "k8s.io/cloud-provider" cloudproviderapi "k8s.io/cloud-provider/api" cloudprovidernodeutil "k8s.io/cloud-provider/node/helpers" "k8s.io/component-base/version" v1helper "k8s.io/kubernetes/pkg/apis/core/v1/helper" "k8s.io/kubernetes/pkg/features"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 25 12:12:04 UTC 2024 - 30.5K bytes - Viewed (0) -
pkg/kubeapiserver/admission/initializer_test.go
} func TestCloudConfigAdmissionPlugin(t *testing.T) { cloudConfig := []byte("cloud-configuration") initializer := NewPluginInitializer(cloudConfig) wantsCloudConfigAdmission := &WantsCloudConfigAdmissionPlugin{} initializer.Initialize(wantsCloudConfigAdmission) if wantsCloudConfigAdmission.cloudConfig == nil { t.Errorf("Expected cloud config to be initialized but found nil") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 29 21:28:42 UTC 2024 - 1.5K bytes - Viewed (0) -
cmd/kube-controller-manager/app/controllermanager.go
RESTMapper *restmapper.DeferredDiscoveryRESTMapper // Cloud is the cloud provider interface for the controllers to use. // It must be initialized and ready to use. Cloud cloudprovider.Interface // Control for which control loops to be run // IncludeCloudLoops is for a kube-controller-manager running all loops // ExternalLoops is for a kube-controller-manager running with a cloud-controller-manager LoopMode ControllerLoopMode
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 13:03:53 UTC 2024 - 37.5K bytes - Viewed (0) -
hack/local-up-cluster.sh
} function start_controller_manager { cloud_config_arg=("--cloud-provider=${CLOUD_PROVIDER}" "--cloud-config=${CLOUD_CONFIG}") cloud_config_arg+=("--configure-cloud-routes=${CONFIGURE_CLOUD_ROUTES}") if [[ "${EXTERNAL_CLOUD_PROVIDER:-}" == "true" ]]; then cloud_config_arg=("--cloud-provider=external") cloud_config_arg+=("--external-cloud-volume-plugin=${EXTERNAL_CLOUD_VOLUME_PLUGIN}")
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 02:33:52 UTC 2024 - 53.3K bytes - Viewed (0)