Search Options

Results per page
Sort
Preferred Languages
Advance

Results 111 - 120 of 249 for attach (0.07 sec)

  1. CHANGELOG/CHANGELOG-1.32.md

    - The CSI volume plugin stopped watching the VolumeAttachment object if the object is not found or the volume is not attached when kubelet waits for a volume attached. In the past, it would fail due to missing permission. ([#126961](https://github.com/kubernetes/kubernetes/pull/126961), [@carlory](https://github.com/carlory)) [SIG Storage]
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 13 14:49:49 UTC 2025
    - 412.3K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.25.md

    - FibreChannel volume plugin may match the wrong device and wrong associated devicemapper parent. This may cause a disaster that pods attach wrong disks. ([#110719](https://github.com/kubernetes/kubernetes/pull/110719), [@xakdwch](https://github.com/xakdwch))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  3. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks { #timing-attacks }
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.33.md

    - Changed the error message displayed when a pod is trying to attach a volume that does not match the label/selector from "x node(s) had volume node affinity conflict" to "x node(s) didn't match PersistentVolume's node affinity". ([#129887](https://github.com/kubernetes/kubernetes/pull/129887), [@rhrmo](https://github.com/rhrmo))...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 13 19:46:23 UTC 2025
    - 294.3K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.29.md

    - Fixed attaching volumes after detach errors. Now volumes that failed to detach are not treated as attached. Kubernetes will make sure they are fully attached before they can be used by pods. ([#120595](https://github.com/kubernetes/kubernetes/pull/120595), [@jsafrane](https://github.com/jsafrane))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Mar 12 00:36:01 UTC 2025
    - 429.6K bytes
    - Viewed (1)
  6. SECURITY.md

    mitigate the risk in this scenario is to sandbox the model execution.
    
    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.27.md

    - Fixed attaching volumes after detach errors. Now volumes that failed to detach are not treated as attached, Kubernetes will make sure they are fully attached before they can be used by pods. ([#120595](https://github.com/kubernetes/kubernetes/pull/120595), [@jsafrane](https://github.com/jsafrane)) [SIG Apps and Storage]
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jul 17 07:48:22 UTC 2024
    - 466.3K bytes
    - Viewed (2)
  8. docs/es/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks".
    
    ### Timing Attacks
    
    ¿Pero qué es un "timing attack"?
    
    Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.
    
    Y envían un request con un nombre de usuario `johndoe` y una contraseña `love123`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  9. docs/features/https.md

    By default, OkHttp trusts the certificate authorities of the host platform. This strategy maximizes connectivity, but it is subject to certificate authority attacks such as the [2011 DigiNotar attack](https://www.computerworld.com/article/2510951/cybercrime-hacking/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority.
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Dec 24 00:16:30 UTC 2022
    - 10.5K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.34.md

    ### Other (Cleanup or Flake)
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 27 10:36:10 UTC 2025
    - 292.8K bytes
    - Viewed (1)
Back to top