- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 56 for privileges (0.08 sec)
-
docs/pt/docs/advanced/behind-a-proxy.md
``` Isso diz ao Traefik para escutar na porta 9999 e usar outro arquivo `routes.toml`. /// tip | Dica Estamos usando a porta 9999 em vez da porta padrão HTTP 80 para que você não precise executá-lo com privilégios de administrador (`sudo`). /// Agora crie esse outro arquivo `routes.toml`: ```TOML hl_lines="5 12 20" [http] [http.middlewares] [http.middlewares.api-stripprefix.stripPrefix]
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sat Nov 09 16:39:20 UTC 2024 - 12.2K bytes - Viewed (0) -
docs/es/docs/tutorial/handling-errors.md
Este cliente podría ser un navegador con un frontend, un código de otra persona, un dispositivo IoT, etc. Podrías necesitar decirle al cliente que: * El cliente no tiene suficientes privilegios para esa operación. * El cliente no tiene acceso a ese recurso. * El ítem al que el cliente intentaba acceder no existe. * etc.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.6K bytes - Viewed (0) -
docs/es/docs/advanced/behind-a-proxy.md
Esto le dice a Traefik que escuche en el puerto 9999 y que use otro archivo `routes.toml`. /// tip | Consejo Estamos utilizando el puerto 9999 en lugar del puerto HTTP estándar 80 para que no tengas que ejecutarlo con privilegios de administrador (`sudo`). /// Ahora crea ese otro archivo `routes.toml`: ```TOML hl_lines="5 12 20" [http] [http.middlewares] [http.middlewares.api-stripprefix.stripPrefix]
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 12.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.20.md
- Dockershim security: pod sandbox now always run with `no-new-privileges` and `runtime/default` seccomp profile
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jan 19 21:05:45 UTC 2022 - 409K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.4.md
### Other notable changes * rkt: Improve support for privileged pod (pod whose all containers are privileged) ([#31286](https://github.com/kubernetes/kubernetes/pull/31286), [@yifan-gu](https://github.com/yifan-gu))
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 133.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.5.md
2. Review and delete any PodSecurityPolicy objects you do not want all pod-creating users to be able to use (NOTE: Privileged users that were making use of those policies will also lose access to those policies). For example: * `kubectl delete podsecuritypolicies/my-privileged-policy` 3. After upgrading to 1.5.5, re-create the exported PodSecurityPolicy objects: * `kubectl create -f psp.yaml` ## Downloads for v1.5.5
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 136.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
* Fixed issue when using OpenStack config drive for node metadata. Since we need to run commands such as blkid, we need to ensure that api server and kube controller are running in the privileged mode. ([#57561](https://github.com/kubernetes/kubernetes/pull/57561), [@dims](https://github.com/dims))
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
### Introducing Windows CSI support alpha for Kubernetes With the release of Kubernetes 1.18, an alpha version of CSI Proxy for Windows is getting released. CSI proxy enables non-privileged (pre-approved) containers to perform privileged storage operations on Windows. CSI drivers can now be supported in Windows by leveraging CSI proxy. SIG Storage made a lot of progress in the 1.18 release.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.15.md
* ACTION REQUIRED: The deprecated Kubelet flag `--allow-privileged` has been removed. Remove any use of `--allow-privileged` from your kubelet scripts or manifests.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 278.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.34.md
- DRAAdminAccess was enabled by default allowing users to create `ResourceClaims` and `ResourceClaimTemplates` in privileged mode to grant access to devices that were in use by other users for admin tasks like monitoring health or status of the device. ([#133085](https://github.com/kubernetes/kubernetes/pull/133085), [@ritazh](https://github.com/ritazh)) [SIG Auth and...
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Aug 27 10:36:10 UTC 2025 - 292.8K bytes - Viewed (0)