Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 21 - 28 of 28 for Compacted (0.11 seconds)

  1. CHANGELOG/CHANGELOG-1.14.md

    * [IPVS] Introduces flag ipvs-strict-arp to configure stricter ARP sysctls, defaulting to false to preserve existing behaviors. This was enabled by default in 1.13.0, which impacted a few CNI plugins. ([#75295](https://github.com/kubernetes/kubernetes/pull/75295), [@lbernail](https://github.com/lbernail))
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Mon Jun 14 22:06:39 GMT 2021
    - 271.5K bytes
    - Click Count (0)
  2. CHANGELOG/CHANGELOG-1.10.md

    ### Action Required
    
    * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ``` ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
    
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu May 05 13:44:43 GMT 2022
    - 341.8K bytes
    - Click Count (0)
  3. CHANGELOG/CHANGELOG-1.11.md

    ### Action Required
    
    * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu Feb 06 06:04:15 GMT 2020
    - 328.4K bytes
    - Click Count (0)
  4. CHANGELOG/CHANGELOG-1.12.md

    * ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ([#65499](https://github.com/kubernetes/kubernetes/pull/65499), [@krunaljain](https://github.com/krunaljain))
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu Feb 06 06:04:15 GMT 2020
    - 293.8K bytes
    - Click Count (0)
  5. CHANGELOG/CHANGELOG-1.22.md

    This issue has been rated low and assigned CVE-2021-25749
    
    ### Am I vulnerable?
    
    All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted
    
    #### Affected Versions
    
    - kubelet v1.20 - v1.21
    - kubelet v1.22.0 - v1.22.13
    - kubelet v1.23.0 - v1.23.10
    - kubelet v1.24.0 - v1.24.4
    
    ### How do I mitigate this vulnerability?
    
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Click Count (0)
  6. RELEASE.md

        `tf.compat.v1.image.extract_glimpse` does not change. The behavior of
        existing C++ kernel `ExtractGlimpse` does not change either, so saved models
        using `tf.raw_ops.ExtractGlimpse` will not be impacted.
    
    ## Known Caveats
    
    *   `tf.lite`
        *   Keras-based LSTM models must be converted with an explicit batch size in
            the input layer.
    
    ## Bug Fixes and Other Changes
    
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Mon Mar 30 18:31:38 GMT 2026
    - 746.5K bytes
    - Click Count (3)
  7. CHANGELOG/CHANGELOG-1.19.md

    unschedulable from the candidate nodes. The service load balancer exclusion label should be used instead.
      
      Users upgrading from 1.18 who have cordoned nodes should set the `node.kubernetes.io/exclude-from-external-load-balancers` label on the impacted nodes before upgrading if they wish those nodes to remain excluded from service load balancers. ([#90823](https://github.com/kubernetes/kubernetes/pull/90823), [@smarterclayton](https://github.com/smarterclayton)) [SIG Apps, Cloud Provider and Network]...
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Wed Jan 05 05:42:32 GMT 2022
    - 489.7K bytes
    - Click Count (0)
  8. CHANGELOG/CHANGELOG-1.24.md

    This issue has been rated low and assigned CVE-2021-25749
    
    ### Am I vulnerable?
    
    All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted
    
    #### Affected Versions
    
    - kubelet v1.20 - v1.21
    - kubelet v1.22.0 - v1.22.13
    - kubelet v1.23.0 - v1.23.10
    - kubelet v1.24.0 - v1.24.4
    
    ### How do I mitigate this vulnerability?
    
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu Aug 24 00:02:43 GMT 2023
    - 473.4K bytes
    - Click Count (0)
Back to Top