- Sort Score
- Result 10 results
- Languages All
Results 21 - 27 of 27 for Compacted (0.14 sec)
-
CHANGELOG/CHANGELOG-1.12.md
* ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 293.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
### Action Required * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ``` ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.11.md
### Action Required * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 328.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This issue has been rated low and assigned CVE-2021-25749 ### Am I vulnerable? All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted #### Affected Versions - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 ### How do I mitigate this vulnerability?
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
RELEASE.md
`tf.compat.v1.image.extract_glimpse` does not change. The behavior of existing C++ kernel `ExtractGlimpse` does not change either, so saved models using `tf.raw_ops.ExtractGlimpse` will not be impacted. ## Known Caveats * `tf.lite` * Keras-based LSTM models must be converted with an explicit batch size in the input layer. ## Bug Fixes and Other Changes
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Tue Oct 22 14:33:53 UTC 2024 - 735.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
This issue has been rated low and assigned CVE-2021-25749 ### Am I vulnerable? All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted #### Affected Versions - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13 - kubelet v1.23.0 - v1.23.10 - kubelet v1.24.0 - v1.24.4 ### How do I mitigate this vulnerability?
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Aug 24 00:02:43 UTC 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.19.md
unschedulable from the candidate nodes. The service load balancer exclusion label should be used instead. Users upgrading from 1.18 who have cordoned nodes should set the `node.kubernetes.io/exclude-from-external-load-balancers` label on the impacted nodes before upgrading if they wish those nodes to remain excluded from service load balancers. ([#90823](https://github.com/kubernetes/kubernetes/pull/90823), [@smarterclayton](https://github.com/smarterclayton)) [SIG Apps, Cloud Provider and Network]...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jan 05 05:42:32 UTC 2022 - 489.7K bytes - Viewed (0)