- Sort Score
- Num 10 results
- Language All
Results 21 - 28 of 28 for Compacted (0.11 seconds)
-
CHANGELOG/CHANGELOG-1.14.md
* [IPVS] Introduces flag ipvs-strict-arp to configure stricter ARP sysctls, defaulting to false to preserve existing behaviors. This was enabled by default in 1.13.0, which impacted a few CNI plugins. ([#75295](https://github.com/kubernetes/kubernetes/pull/75295), [@lbernail](https://github.com/lbernail))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.10.md
### Action Required * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ``` ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 341.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
### Action Required * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.12.md
* ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 293.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
This issue has been rated low and assigned CVE-2021-25749 ### Am I vulnerable? All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted #### Affected Versions - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 ### How do I mitigate this vulnerability?
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0) -
RELEASE.md
`tf.compat.v1.image.extract_glimpse` does not change. The behavior of existing C++ kernel `ExtractGlimpse` does not change either, so saved models using `tf.raw_ops.ExtractGlimpse` will not be impacted. ## Known Caveats * `tf.lite` * Keras-based LSTM models must be converted with an explicit batch size in the input layer. ## Bug Fixes and Other ChangesCreated: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Mon Mar 30 18:31:38 GMT 2026 - 746.5K bytes - Click Count (3) -
CHANGELOG/CHANGELOG-1.19.md
unschedulable from the candidate nodes. The service load balancer exclusion label should be used instead. Users upgrading from 1.18 who have cordoned nodes should set the `node.kubernetes.io/exclude-from-external-load-balancers` label on the impacted nodes before upgrading if they wish those nodes to remain excluded from service load balancers. ([#90823](https://github.com/kubernetes/kubernetes/pull/90823), [@smarterclayton](https://github.com/smarterclayton)) [SIG Apps, Cloud Provider and Network]...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jan 05 05:42:32 GMT 2022 - 489.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.24.md
This issue has been rated low and assigned CVE-2021-25749 ### Am I vulnerable? All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted #### Affected Versions - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 ### How do I mitigate this vulnerability?
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Click Count (0)