Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 23 for type (0.18 sec)

  1. CHANGELOG/CHANGELOG-1.13.md

            * `kubernetes.io/hostname`
            * `kubernetes.io/instance-type`
            * `kubernetes.io/os`
            * `kubernetes.io/arch`
            * `beta.kubernetes.io/instance-type`
            * `beta.kubernetes.io/os`
            * `beta.kubernetes.io/arch`
            * `failure-domain.kubernetes.io/zone`
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu May 05 13:44:43 GMT 2022
    - 273.1K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.20.md

    - Certain fields on  Service objects will be automatically cleared when changing the service's `type` to a mode that does not need those fields.  For example, changing from type=LoadBalancer to type=ClusterIP will clear the NodePort assignments, rather than forcing the user to clear them. ([#95196](https://github.com/kubernetes/kubernetes/pull/95196), [@thockin](https://github.com/thockin)) [SIG API Machinery, Apps, Network and Testing]
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Wed Jan 19 21:05:45 GMT 2022
    - 409K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.16.md

    * For x-kubernetes-list-type=set a scalar or atomic item type is now required, as documented. Persisted, invalid data is tolerated. ([#85385](https://github.com/kubernetes/kubernetes/pull/85385), [@sttts](https://github.com/sttts))
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Feb 11 10:00:57 GMT 2021
    - 345.2K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.23.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Tue Feb 28 21:06:52 GMT 2023
    - 424.5K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.24.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Aug 24 00:02:43 GMT 2023
    - 473.4K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.25.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Nov 16 11:30:31 GMT 2023
    - 419K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.22.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Viewed (1)
  8. CHANGELOG/CHANGELOG-1.6.md

    Also, please note:
    - using `application/vnd.kubernetes.protobuf` as the media storage type for 1.6 is default but not required
    - the ability to rollback to etcd2 can be preserved by setting the storage media type flag on `kube-apiserver`
    
      ```
      --storage-media-type application/json
      ```
    
      to continue to use `application/json` as the storage media type which can be changed to
      `application/vnd.kubernetes.protobuf` at a later time.
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.15.md

    ### Deprecated/changed metrics
    
    - kubelet probe metrics are now of the counter type rather than the gauge type, and the `prober_probe_result` has been replaced by `prober_probe_total`. ([#76074](https://github.com/kubernetes/kubernetes/pull/76074), [@danielqsj](https://github.com/danielqsj))
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu May 05 13:44:43 GMT 2022
    - 278.9K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.7.md

    ([#46669](https://github.com/kubernetes/kubernetes/pull/46669), [@kow3ns](https://github.com/kow3ns)).
    
    * ControllerRevision type has been added for StatefulSet and DaemonSet history. Clients should not depend on the stability of this type as it may change, as necessary, in future releases to support StatefulSet and DaemonSet update and rollback. We enable this type as we do with beta features, because StatefulSet update and DaemonSet update are enabled. ([#45867](https://github.com/kubernete...
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu May 05 13:44:43 GMT 2022
    - 308.7K bytes
    - Viewed (1)
Back to top