issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 261k ⌀ | issue_title stringlengths 1 925 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 2.5k | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 387k 2.91B | issue_number int64 1 131k |
|---|---|---|---|---|---|---|---|---|---|
[
"kubernetes",
"kubernetes"
] | Currently uses Endpoints. Maybe that is OK? A comment at least... | Convert Service REST ResourceLocation() to use EndpointSlice? | https://api.github.com/repos/kubernetes/kubernetes/issues/103328/comments | 7 | 2021-06-30T05:33:25Z | 2022-02-23T22:12:12Z | https://github.com/kubernetes/kubernetes/issues/103328 | 933,322,398 | 103,328 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
When I do `k... | network plugin is not ready & cni config uninitialized | https://api.github.com/repos/kubernetes/kubernetes/issues/103324/comments | 7 | 2021-06-30T03:22:39Z | 2021-07-02T18:13:24Z | https://github.com/kubernetes/kubernetes/issues/103324 | 933,268,543 | 103,324 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Terminating a pod on a windows node causes the network latency to spike and sometimes timeout completely on all windows nodes in the cluster.
The linux nodes running on the same hosts / subnet / VLAN as the windows nodes experience no network issues at all.
#### What you expected to happen:
De... | Windows nodes have high latency / network drops when pod is terminated on windows node | https://api.github.com/repos/kubernetes/kubernetes/issues/103312/comments | 9 | 2021-06-29T20:40:33Z | 2021-12-05T22:29:09Z | https://github.com/kubernetes/kubernetes/issues/103312 | 933,085,780 | 103,312 |
[
"kubernetes",
"kubernetes"
] | Add a test to capture the working default config from current and previous releases to make sure that continues to load/validate successfully.
See example configurations that can be used in https://github.com/kubernetes/kubernetes/pull/101822#issuecomment-870768062
/sig scheduling
/help
/good-first-issue
| Scheduler: add tests to verify backward compatibility of component config | https://api.github.com/repos/kubernetes/kubernetes/issues/103309/comments | 9 | 2021-06-29T19:49:32Z | 2021-12-10T18:19:22Z | https://github.com/kubernetes/kubernetes/issues/103309 | 933,051,891 | 103,309 |
[
"kubernetes",
"kubernetes"
] | --write-to-config flag in the scheduler writes to a file the default component config; however this config if passed back to the scheduler is not usable because it lists all default plugins as enabled without disabling them.
To make the configuration usable as an input config while at the same time useful for debugg... | Scheduler: Ensure the default config output of --write-to-config is usable | https://api.github.com/repos/kubernetes/kubernetes/issues/103308/comments | 3 | 2021-06-29T19:40:08Z | 2021-07-01T04:00:06Z | https://github.com/kubernetes/kubernetes/issues/103308 | 933,045,994 | 103,308 |
[
"kubernetes",
"kubernetes"
] | **What would you like to be added:**
The ReadWriteOnce PVC access mode guarantees only the pods on a single node can access the provided PVC as a volume. This is enforced during volume attachment (in kube-controller-manager), and should be additionally enforced during scheduling.
**Why is this needed:**
Because wi... | Enforce ReadWriteOnce PVC access mode during scheduling | https://api.github.com/repos/kubernetes/kubernetes/issues/103305/comments | 49 | 2021-06-29T18:42:24Z | 2024-07-25T15:54:37Z | https://github.com/kubernetes/kubernetes/issues/103305 | 933,006,798 | 103,305 |
[
"kubernetes",
"kubernetes"
] | When updating policy labels on a namespace, existing pods are evaluated to see if they are compatible with the new policy.
If there are too many pods, or if evaluation takes too long, we short circuit and warn that not all pods were checked.
For that reason, we want to prioritize checking a variety of pods before... | [PodSecurity] prioritize checking unique or controllerless pods when checking inside a namespace | https://api.github.com/repos/kubernetes/kubernetes/issues/103304/comments | 11 | 2021-06-29T18:34:54Z | 2021-11-02T21:28:14Z | https://github.com/kubernetes/kubernetes/issues/103304 | 933,001,466 | 103,304 |
[
"kubernetes",
"kubernetes"
] | - [ ] Add tests to verify timeouts & pod limits on namespace checks | [PodSecurity] Scale testing of namespace bulk check behavior | https://api.github.com/repos/kubernetes/kubernetes/issues/103303/comments | 1 | 2021-06-29T18:19:41Z | 2021-10-04T19:21:31Z | https://github.com/kubernetes/kubernetes/issues/103303 | 932,990,317 | 103,303 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Consider the following setup.
Have a main container with a liveness probe and a http prestop hook.
Have a side container running a webserver that is listening on said prestop hook, stalling connections indefinitely.
If the following happens:
- main container start failing the liveness probe... | Kubernetes never cancels PreStop http hook | https://api.github.com/repos/kubernetes/kubernetes/issues/103300/comments | 11 | 2021-06-29T16:09:49Z | 2022-06-19T21:07:35Z | https://github.com/kubernetes/kubernetes/issues/103300 | 932,880,255 | 103,300 |
[
"kubernetes",
"kubernetes"
] | #### What would you like to be added:
Is the `net.ipv4.ip_unprivileged_port_start` sysctl namespaced? If so, can we include this in the set of "safe" sysctls?
If we allow this, we would:
- add to `SafeSysctlWhitelist()`
- permit in PodSecurity baseline profile
cc @mrunalp @tallclair
#### Why is this need... | Mark net.ipv4.ip_unprivileged_port_start as a safe sysctl | https://api.github.com/repos/kubernetes/kubernetes/issues/103298/comments | 5 | 2021-06-29T14:46:04Z | 2021-07-01T16:49:55Z | https://github.com/kubernetes/kubernetes/issues/103298 | 932,777,823 | 103,298 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
```go
func ... | BoundedFrequencyRunner Loop maybe into an infinite loop | https://api.github.com/repos/kubernetes/kubernetes/issues/103286/comments | 23 | 2021-06-29T03:36:43Z | 2021-07-29T23:13:38Z | https://github.com/kubernetes/kubernetes/issues/103286 | 932,175,421 | 103,286 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened: In my kuberne... | pod can not delete | https://api.github.com/repos/kubernetes/kubernetes/issues/103285/comments | 5 | 2021-06-29T03:32:13Z | 2021-06-29T09:25:24Z | https://github.com/kubernetes/kubernetes/issues/103285 | 932,173,171 | 103,285 |
[
"kubernetes",
"kubernetes"
] | /kind bug
#### What happened:
```console
[root@dce-10-31-11-1 ~]# kubectl logs -l dce.daocloud.io/app=dsm-demo
error: container s0 is not valid for pod s1-7886d4cf8b-2c9th
```
#### What you expected to happen:
The logs of pods with label `dce.daocloud.io/app=dsm-demo` will be output expected without erro... | kubectl logs error if multiple pods selected with different containerName | https://api.github.com/repos/kubernetes/kubernetes/issues/103283/comments | 6 | 2021-06-29T03:11:27Z | 2021-07-08T13:34:43Z | https://github.com/kubernetes/kubernetes/issues/103283 | 932,163,638 | 103,283 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
`flannel` pa... | kubernetes fails to start with a flannel crash when using a ppp0 modem interface | https://api.github.com/repos/kubernetes/kubernetes/issues/103280/comments | 4 | 2021-06-28T22:00:45Z | 2021-06-29T01:39:36Z | https://github.com/kubernetes/kubernetes/issues/103280 | 932,026,298 | 103,280 |
[
"kubernetes",
"kubernetes"
] | #### What would you like to be added:
Implement up updated version of the volume populators KEP, which modifies the PVC API.
#### Why is this needed:
KEP 1495 was updated for the 1.22 release with a new design:
https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/1495-volume-populators | Update volume populators for 1.22 | https://api.github.com/repos/kubernetes/kubernetes/issues/103275/comments | 2 | 2021-06-28T20:01:15Z | 2021-07-07T15:56:44Z | https://github.com/kubernetes/kubernetes/issues/103275 | 931,934,045 | 103,275 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
This issue was initially filed as [... | Admission controller's valid `allowed: false` response causes kubelet to retry forever | https://api.github.com/repos/kubernetes/kubernetes/issues/103274/comments | 10 | 2021-06-28T19:53:03Z | 2021-12-11T20:34:44Z | https://github.com/kubernetes/kubernetes/issues/103274 | 931,925,527 | 103,274 |
[
"kubernetes",
"kubernetes"
] | Tasks:
- [x] Decide on restricted capabilities policy - discussion in https://docs.google.com/document/d/1Z26yS26z5saILHzj9nSvlbGOBJP_6c182Fl-vAi8AQY/edit
- Proposal has buy-in
- [ ] Update Pod Security Standards documentation - https://github.com/kubernetes/website/pull/27882
- [ ] Implement `check_dropCapabil... | [PodSecurity] restricted capabilities | https://api.github.com/repos/kubernetes/kubernetes/issues/103271/comments | 9 | 2021-06-28T17:50:59Z | 2021-07-07T21:20:23Z | https://github.com/kubernetes/kubernetes/issues/103271 | 931,817,340 | 103,271 |
[
"kubernetes",
"kubernetes"
] | Currently many CSI drivers report requested volume size as response of `ControllerExpandVolume` RPC call, instead they should return actual volume size after expansion as CSI spec requires:
```
// Capacity of volume after expansion. This field is REQUIRED.
int64 capacity_bytes = 1;
```
We should cover this... | Fix CSI drivers to report actual size of the volume after ControllerExpandVolume and add sanity tests for it | https://api.github.com/repos/kubernetes/kubernetes/issues/103267/comments | 13 | 2021-06-28T16:16:10Z | 2022-10-01T16:47:08Z | https://github.com/kubernetes/kubernetes/issues/103267 | 931,736,285 | 103,267 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
In a dual-... | "fieldPath: status.podIP" may use wrong IP family in dual stack cluster. | https://api.github.com/repos/kubernetes/kubernetes/issues/103263/comments | 6 | 2021-06-28T13:20:26Z | 2021-07-07T05:11:20Z | https://github.com/kubernetes/kubernetes/issues/103263 | 931,565,846 | 103,263 |
[
"kubernetes",
"kubernetes"
] | #### What happened:

#### What you expected to happen:
no panic
#### Anything else we need to know?:
https://github.com/kubernetes/kubernetes/blob/release-1.16/pkg/proxy/ipvs/graceful_termination.go... | ipvs: Concurrent map read and map write exist in kube-proxy | https://api.github.com/repos/kubernetes/kubernetes/issues/103260/comments | 16 | 2021-06-28T12:30:48Z | 2022-01-26T13:10:02Z | https://github.com/kubernetes/kubernetes/issues/103260 | 931,520,570 | 103,260 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Using minReadySeconds:550 in Deployment, rollingUpdate strategy (maxSurge:0, maxUnavailable:2) and replicas:6.
When querying Deployment (kubectl get deployment), the field AVAILABLE does not update according to the value used in minReadySeconds and maxUnavailable. It will take longer and it will ... | Inttermitent extra delays when using minReadySeconds in Deployment | https://api.github.com/repos/kubernetes/kubernetes/issues/103258/comments | 8 | 2021-06-28T11:07:41Z | 2022-02-24T10:21:26Z | https://github.com/kubernetes/kubernetes/issues/103258 | 931,451,985 | 103,258 |
[
"kubernetes",
"kubernetes"
] | i have the latest (1.21.2) version of k8s. GarbageCollector is trying to remove all docker images even if they wasnt pulled by k8s. how to disable it? i tried to configure DiskPressure and MemoryPressure to the highest threshold (including deprecated flags) but it didnt help | ImageGC removing all unused images | https://api.github.com/repos/kubernetes/kubernetes/issues/103255/comments | 8 | 2021-06-28T10:02:16Z | 2022-01-07T20:17:38Z | https://github.com/kubernetes/kubernetes/issues/103255 | 931,395,519 | 103,255 |
[
"kubernetes",
"kubernetes"
] | ### Failure cluster [78118168f2359d9363b3](https://go.k8s.io/triage#78118168f2359d9363b3)
https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/nodeshutdown/nodeshutdown_manager_linux.go#L121-L131
https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/nodeshutdown/nodeshutdown_manager_linux_t... | Data Race in systemDBus Unit test | https://api.github.com/repos/kubernetes/kubernetes/issues/103251/comments | 3 | 2021-06-28T08:40:55Z | 2021-07-09T15:43:15Z | https://github.com/kubernetes/kubernetes/issues/103251 | 931,322,659 | 103,251 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Liveness probe seems to be restarting container, however old container is still running somehow on a cluster.
#### What you expected to happen:
Old containers are stopped.
#### How to reproduce it (as minimally and precisely as possible):
Reproducing it might be a little tricky, as you cann... | Windows container are not killed properly by liveness probe | https://api.github.com/repos/kubernetes/kubernetes/issues/103250/comments | 5 | 2021-06-28T08:34:26Z | 2021-07-06T02:27:56Z | https://github.com/kubernetes/kubernetes/issues/103250 | 931,317,197 | 103,250 |
[
"kubernetes",
"kubernetes"
] | Refer to https://github.com/census-instrumentation/opencensus-go/issues/1074, open an issue to track a P1 issue in k/k dependencies `go.opencensus.io`.
/area code-organization dependency
/priority important-longterm
We upgrade `go.opencensus.io` from v0.22.3 to v0.23.0. It should have problems with both the old ... | Dependencies `go.opencensus.io` exist P1 issue: goroutine started on init() function | https://api.github.com/repos/kubernetes/kubernetes/issues/103247/comments | 6 | 2021-06-28T07:25:54Z | 2022-01-30T16:28:50Z | https://github.com/kubernetes/kubernetes/issues/103247 | 931,259,627 | 103,247 |
[
"kubernetes",
"kubernetes"
] | #### Which jobs are flaking:
pull-kubernetes-unit
#### Which test(s) are flaking:
TestErrConnKilled
#### Testgrid link:
https://prow.k8s.io/view/gs/kubernetes-jenkins/pr-logs/pull/103107/pull-kubernetes-unit/1409355697006579712
#### Reason for failure:
Data RACE in unit test
```
k8s.io/kubernetes/vendor/... | data race in TestErrConnKilled | https://api.github.com/repos/kubernetes/kubernetes/issues/103246/comments | 4 | 2021-06-28T05:43:51Z | 2021-06-30T10:11:14Z | https://github.com/kubernetes/kubernetes/issues/103246 | 931,192,932 | 103,246 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
I am getting a crash when trying to sort pod with kubectl on `.status.containerStatuses[]`
#### What you expected to happen:
Not crashing and at least an error message
#### How to reproduce it (as minimally and precisely as possible):
* `kubectl get pod -o name --sort-by=.status.conta... | kubectl get crash when sorting with a bad unsortable field | https://api.github.com/repos/kubernetes/kubernetes/issues/103239/comments | 8 | 2021-06-27T09:22:27Z | 2021-08-05T02:00:48Z | https://github.com/kubernetes/kubernetes/issues/103239 | 930,887,857 | 103,239 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Use apiserver extension(APIService) `RESTGracefulDeleteStrategy` interface, impl its method `CheckGracefulDelete` to gracefully control resource deletion, when the field `options.GracePeriodSeconds` is nil, will lead to panic!!
#### What you expected to happen:
To first check if `options.GraceP... | [Apiserver-extension] `RESTGracefulDeleteStrategy` impl leads to nil panic | https://api.github.com/repos/kubernetes/kubernetes/issues/103228/comments | 2 | 2021-06-26T07:48:37Z | 2021-07-07T17:43:41Z | https://github.com/kubernetes/kubernetes/issues/103228 | 930,640,194 | 103,228 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
https://gith... | Custom Transport can't be used with client-go if client cert is used | https://api.github.com/repos/kubernetes/kubernetes/issues/103225/comments | 5 | 2021-06-26T06:28:02Z | 2021-09-27T20:27:48Z | https://github.com/kubernetes/kubernetes/issues/103225 | 930,628,441 | 103,225 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
https://gith... | `kubernetes.New(c rest.Interface) *Clientset` api is not usable | https://api.github.com/repos/kubernetes/kubernetes/issues/103224/comments | 11 | 2021-06-26T06:00:03Z | 2022-03-05T10:14:11Z | https://github.com/kubernetes/kubernetes/issues/103224 | 930,624,575 | 103,224 |
[
"kubernetes",
"kubernetes"
] | <!-- Please only use this template for submitting reports about flaky tests or jobs (pass or fail with no underlying change in code) in Kubernetes CI -->
#### Which jobs are flaking:
pull-kubernetes-unit
#### Which test(s) are flaking:
k8s.io/kubernetes/pkg/controller/volume/persistentvolume: TestControllerSync... | [Flaky unit test] PersistentVolume TestControllerSync | https://api.github.com/repos/kubernetes/kubernetes/issues/103221/comments | 8 | 2021-06-26T00:08:20Z | 2022-01-05T07:03:28Z | https://github.com/kubernetes/kubernetes/issues/103221 | 930,570,513 | 103,221 |
[
"kubernetes",
"kubernetes"
] | null | [PodSecurity] Implement PodSecurity framework & skeleton | https://api.github.com/repos/kubernetes/kubernetes/issues/103215/comments | 0 | 2021-06-25T18:51:08Z | 2021-06-29T03:46:52Z | https://github.com/kubernetes/kubernetes/issues/103215 | 930,422,531 | 103,215 |
[
"kubernetes",
"kubernetes"
] | null | [PodSecurity] Cleanup: deduplicate config→runtime policy method | https://api.github.com/repos/kubernetes/kubernetes/issues/103214/comments | 4 | 2021-06-25T18:47:14Z | 2021-10-19T18:17:04Z | https://github.com/kubernetes/kubernetes/issues/103214 | 930,420,195 | 103,214 |
[
"kubernetes",
"kubernetes"
] | - [ ] Aggregate identical warnings for multiple pods in a namespace
- [ ] Test coverage of aggregation | [PodSecurity] Aggregate identical warnings for multiple pods in a namespace | https://api.github.com/repos/kubernetes/kubernetes/issues/103213/comments | 7 | 2021-06-25T18:47:11Z | 2021-10-26T18:43:10Z | https://github.com/kubernetes/kubernetes/issues/103213 | 930,420,160 | 103,213 |
[
"kubernetes",
"kubernetes"
] | Tasks:
- [ ] Benchmark and optimize pod admission
- [ ] Benchmark and optimize evaluation of identical policies/versions for different actions
- [ ] Benchmark and optimize evaluation of exemptions | [PodSecurity] Add benchmarks | https://api.github.com/repos/kubernetes/kubernetes/issues/103212/comments | 3 | 2021-06-25T18:39:48Z | 2021-09-27T17:18:00Z | https://github.com/kubernetes/kubernetes/issues/103212 | 930,415,766 | 103,212 |
[
"kubernetes",
"kubernetes"
] | Tasks:
- [x] label validation - done in https://github.com/kubernetes/kubernetes/pull/103099
- [x] tolerating no-op updates to existing invalid labels - done in https://github.com/kubernetes/kubernetes/pull/103099
- [x] verifying warning about existing invalid pods - done in https://github.com/kubernetes/kuber... | [PodSecurity] Add test coverage for namespace admission | https://api.github.com/repos/kubernetes/kubernetes/issues/103211/comments | 0 | 2021-06-25T18:38:51Z | 2021-06-29T18:38:16Z | https://github.com/kubernetes/kubernetes/issues/103211 | 930,415,173 | 103,211 |
[
"kubernetes",
"kubernetes"
] | Tasks:
- [ ] status updates don't produce warnings
- [ ] spec updates don't block on enforce failures
- [ ] spec updates produce correct user-visible warnings | [PodSecurity] Add test coverage for pod-template-containing objects | https://api.github.com/repos/kubernetes/kubernetes/issues/103210/comments | 2 | 2021-06-25T18:38:00Z | 2021-07-10T02:40:46Z | https://github.com/kubernetes/kubernetes/issues/103210 | 930,414,651 | 103,210 |
[
"kubernetes",
"kubernetes"
] | Address the TODO here: https://github.com/kubernetes/kubernetes/blob/01819dd322855915e0477dcad3b922d66bec9878/plugin/pkg/admission/security/podsecurity/admission.go#L181-L187 | [PodSecurity] Propagate code/reason to in-tree admission response | https://api.github.com/repos/kubernetes/kubernetes/issues/103209/comments | 1 | 2021-06-25T18:37:54Z | 2021-07-08T00:05:56Z | https://github.com/kubernetes/kubernetes/issues/103209 | 930,414,594 | 103,209 |
[
"kubernetes",
"kubernetes"
] | Tasks:
- [ ] Implement webhook library (WIP commits in https://github.com/kubernetes/kubernetes/pull/103165)
- [ ] Implement webhook command (WIP commits in https://github.com/kubernetes/kubernetes/pull/103165) | [PodSecurity] Implement webhook | https://api.github.com/repos/kubernetes/kubernetes/issues/103208/comments | 0 | 2021-06-25T18:36:40Z | 2021-07-10T02:06:40Z | https://github.com/kubernetes/kubernetes/issues/103208 | 930,413,818 | 103,208 |
[
"kubernetes",
"kubernetes"
] | Tasks:
- [ ] for both pod/pod-controller admission
- [ ] record allow/deny/exempt/error cases correctly
- [ ] record enforce/warn/audit cases correctly | [PodSecurity] Implement and test metrics | https://api.github.com/repos/kubernetes/kubernetes/issues/103207/comments | 5 | 2021-06-25T18:34:12Z | 2021-11-02T01:12:59Z | https://github.com/kubernetes/kubernetes/issues/103207 | 930,412,289 | 103,207 |
[
"kubernetes",
"kubernetes"
] | in restricted v1.22+, must drop NET_RAW (or require dropping ALL?)
discussion in https://docs.google.com/document/d/1Z26yS26z5saILHzj9nSvlbGOBJP_6c182Fl-vAi8AQY/edit
sketch of this check in https://github.com/liggitt/kubernetes/commits/podsecurity-dropcap | [PodSecurity] restricted - dropCapabilities | https://api.github.com/repos/kubernetes/kubernetes/issues/103206/comments | 3 | 2021-06-25T18:26:37Z | 2021-06-29T14:06:24Z | https://github.com/kubernetes/kubernetes/issues/103206 | 930,407,043 | 103,206 |
[
"kubernetes",
"kubernetes"
] | Implement the "seccomp" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
- [ ] implement check_seccomp.go for the baseline policy
- fail if any seccomp profiles are set in the pod security context or container security contexts to type=Unconfined. Include the relevant con... | [PodSecurity] restricted - seccomp | https://api.github.com/repos/kubernetes/kubernetes/issues/103205/comments | 3 | 2021-06-25T18:26:33Z | 2021-07-07T05:11:29Z | https://github.com/kubernetes/kubernetes/issues/103205 | 930,406,998 | 103,205 |
[
"kubernetes",
"kubernetes"
] | null | [PodSecurity] restricted - non-root groups? | https://api.github.com/repos/kubernetes/kubernetes/issues/103204/comments | 4 | 2021-06-25T18:26:28Z | 2021-07-01T14:11:20Z | https://github.com/kubernetes/kubernetes/issues/103204 | 930,406,945 | 103,204 |
[
"kubernetes",
"kubernetes"
] | Implement the "restrictedVolumes" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
- [ ] implement check_restrictedVolumes.go for the baseline policy
- fail if any volumes define any volume sources outside the allowed set, include the relevant volume names in the forbidde... | [PodSecurity] restricted - volume types | https://api.github.com/repos/kubernetes/kubernetes/issues/103203/comments | 2 | 2021-06-25T18:26:24Z | 2021-07-02T01:12:12Z | https://github.com/kubernetes/kubernetes/issues/103203 | 930,406,907 | 103,203 |
[
"kubernetes",
"kubernetes"
] | Implement the "sysctls" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_sysctls.go for the baseline policy
- fail if any containers set `sysctls` to values outside the allowed set, include the relevant container names and invalid values in the forbidd... | [PodSecurity] baseline - sysctls | https://api.github.com/repos/kubernetes/kubernetes/issues/103202/comments | 3 | 2021-06-25T18:26:20Z | 2021-06-30T18:50:08Z | https://github.com/kubernetes/kubernetes/issues/103202 | 930,406,855 | 103,202 |
[
"kubernetes",
"kubernetes"
] | Implement the "procMount" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_procMount.go for the baseline policy
- fail if any containers set `securityContext.procMount` to any value other than `Default`, include the relevant container names and invalid... | [PodSecurity] baseline - procMount type | https://api.github.com/repos/kubernetes/kubernetes/issues/103201/comments | 2 | 2021-06-25T18:26:15Z | 2021-07-01T16:50:08Z | https://github.com/kubernetes/kubernetes/issues/103201 | 930,406,805 | 103,201 |
[
"kubernetes",
"kubernetes"
] | Implement the "AppArmor" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_apparmor.go for the baseline policy
- fail if any apparmor annotations are present that are set `unconfined`, include the relevant container names and invalid values in the forbi... | [PodSecurity] baseline - apparmor | https://api.github.com/repos/kubernetes/kubernetes/issues/103200/comments | 5 | 2021-06-25T18:26:13Z | 2021-07-02T02:20:25Z | https://github.com/kubernetes/kubernetes/issues/103200 | 930,406,768 | 103,200 |
[
"kubernetes",
"kubernetes"
] | Implement the "Host ports" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_hostPorts.go for the baseline policy
- fail if any hostPorts are present in any containers, and include the hostPort numbers and names of the containers in the forbidden detail... | [PodSecurity] baseline - hostPorts | https://api.github.com/repos/kubernetes/kubernetes/issues/103199/comments | 2 | 2021-06-25T18:26:10Z | 2021-06-30T18:49:41Z | https://github.com/kubernetes/kubernetes/issues/103199 | 930,406,743 | 103,199 |
[
"kubernetes",
"kubernetes"
] | Implement the "Host path" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_hostPath.go for the baseline policy
- fail if any hostPath volumes are present in the pod, and include the names of the invalid volumes in the forbidden details
- see staging... | [PodSecurity] baseline - hostPath | https://api.github.com/repos/kubernetes/kubernetes/issues/103198/comments | 2 | 2021-06-25T18:26:07Z | 2021-06-30T18:49:55Z | https://github.com/kubernetes/kubernetes/issues/103198 | 930,406,713 | 103,198 |
[
"kubernetes",
"kubernetes"
] | null | [PodSecurity] baseline - capabilities | https://api.github.com/repos/kubernetes/kubernetes/issues/103197/comments | 1 | 2021-06-25T18:26:03Z | 2021-06-29T03:46:53Z | https://github.com/kubernetes/kubernetes/issues/103197 | 930,406,673 | 103,197 |
[
"kubernetes",
"kubernetes"
] | Implement the "Privileged" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_privileged.go for the baseline policy
- fail if any container sets `privileged` to true, and include the names of the invalid containers in the forbidden details
- see stagi... | [PodSecurity] baseline - privileged containers | https://api.github.com/repos/kubernetes/kubernetes/issues/103196/comments | 2 | 2021-06-25T18:25:57Z | 2021-06-30T23:11:49Z | https://github.com/kubernetes/kubernetes/issues/103196 | 930,406,628 | 103,196 |
[
"kubernetes",
"kubernetes"
] | Implement the "Host Namespaces" check from https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
- [ ] implement check_hostNamespaces.go for the baseline policy
- fail if any of the three host namespace fields are set to true
- see staging/src/k8s.io/pod-security-admission/policy/check_... | [PodSecurity] baseline - hostNamespace | https://api.github.com/repos/kubernetes/kubernetes/issues/103195/comments | 1 | 2021-06-25T18:25:54Z | 2021-06-30T04:19:03Z | https://github.com/kubernetes/kubernetes/issues/103195 | 930,406,593 | 103,195 |
[
"kubernetes",
"kubernetes"
] | Tracking issues:
- [x] #103195
- [x] #103197
- [x] #103198
- [x] #103199
- [x] #103202
- [x] #103196
- [x] #103201
- [x] #103200
- [x] #103381
- [x] #103388
- [x] #103204
- [x] #103203
- [x] #103205
- [x] #103271
Once all the checks have been implemented, we should do a fina... | [PodSecurity] Implement remaining pod security standards checks | https://api.github.com/repos/kubernetes/kubernetes/issues/103194/comments | 3 | 2021-06-25T18:25:34Z | 2021-07-07T21:24:49Z | https://github.com/kubernetes/kubernetes/issues/103194 | 930,406,411 | 103,194 |
[
"kubernetes",
"kubernetes"
] | Implement this method:
https://github.com/kubernetes/kubernetes/blob/d92f6c424d621e9275fa49cbe57a7d501017ef0d/staging/src/k8s.io/pod-security-admission/admission/api/validation/validation.go#L24-L28
Use the `ParseVersion` and `ParseLevel` functions to validate the values (https://github.com/kubernetes/kubernetes/bl... | [PodSecurity] Implement ValidatePodSecurityConfiguration | https://api.github.com/repos/kubernetes/kubernetes/issues/103193/comments | 1 | 2021-06-25T18:25:19Z | 2021-07-08T10:05:13Z | https://github.com/kubernetes/kubernetes/issues/103193 | 930,406,266 | 103,193 |
[
"kubernetes",
"kubernetes"
] | Umbrella issue to track follow-up items from initial PodSecurity PR
Tracking issues for Alpha:
- [x] #103215
- [x] #103194
- [x] #103195
- [x] #103196
- [x] #103197
- [x] #103198
- [x] #103199
- [x] #103200
- [x] #103201
- [x] #103202
- [x] #103388
- [x] #103203
- [x] #103204
- ... | PodSecurity Umbrella Issue | https://api.github.com/repos/kubernetes/kubernetes/issues/103192/comments | 3 | 2021-06-25T18:24:36Z | 2021-11-02T01:12:59Z | https://github.com/kubernetes/kubernetes/issues/103192 | 930,405,798 | 103,192 |
[
"kubernetes",
"kubernetes"
] | Part of enhancement: kubernetes/enhancements#647
This is a continuation of the discussion in https://github.com/kubernetes/kubernetes/pull/94942#discussion_r657114027, which was a discussion of the risks of abuse that might be possible To summarize, the [`otelhttp.WithPublicEndpoint()`](https://github.com/open-tel... | Re-entrant apiserver calls are not part of the same trace | https://api.github.com/repos/kubernetes/kubernetes/issues/103186/comments | 37 | 2021-06-25T15:42:02Z | 2025-03-04T21:22:34Z | https://github.com/kubernetes/kubernetes/issues/103186 | 930,291,414 | 103,186 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Attempting to create three namespaces (foo, bar, baz).
Notice the first YAML document separator has the comment `# something` after it on the same line.
```
kubectl apply -f - << EOF
apiVersion: v1
kind: Namespace
metadata:
name: foo
--- # something
apiVersion: v1
kind: Namespace
... | YAML separator with comment causes the next resource to be silently ignored | https://api.github.com/repos/kubernetes/kubernetes/issues/103185/comments | 11 | 2021-06-25T13:24:12Z | 2021-07-09T13:01:07Z | https://github.com/kubernetes/kubernetes/issues/103185 | 930,172,463 | 103,185 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
healthCheckN... | healthCheckNodePort in service object cannot listen on specific ip address | https://api.github.com/repos/kubernetes/kubernetes/issues/103184/comments | 5 | 2021-06-25T12:30:15Z | 2021-09-13T22:43:52Z | https://github.com/kubernetes/kubernetes/issues/103184 | 930,131,545 | 103,184 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
In the docs for [TTL Controller](https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/#ttl-controller), there is a hint about using a mutating admission webhook to set `.spec.ttlSecondsAfterFinished` dynamically after a Job has finished to choose different TTL values based o... | Dynamically set ttlSecondsAfterFinished via mutating webhook after job completion | https://api.github.com/repos/kubernetes/kubernetes/issues/103182/comments | 24 | 2021-06-25T09:52:29Z | 2024-06-22T02:05:02Z | https://github.com/kubernetes/kubernetes/issues/103182 | 930,021,988 | 103,182 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
Upon manua... | Statefulset pods are not evicted when we shutdown the node manually | https://api.github.com/repos/kubernetes/kubernetes/issues/103175/comments | 7 | 2021-06-25T07:20:59Z | 2021-12-10T16:19:24Z | https://github.com/kubernetes/kubernetes/issues/103175 | 929,905,610 | 103,175 |
[
"kubernetes",
"kubernetes"
] | When running the following program on the control-plane Node of my K8s cluster, I observe a large amount of goroutines and therefore memory being leaked:
```go
package main
import (
"bytes"
"flag"
"fmt"
"net/http"
_ "net/http/pprof"
"path/filepath"
corev1 "k8s.io/api/core/v1"
"k8s.io/client-go/ku... | client-go v0.21 leaking go routines when using SPDYExecutor | https://api.github.com/repos/kubernetes/kubernetes/issues/105830/comments | 31 | 2021-06-24T23:28:39Z | 2023-07-06T00:53:23Z | https://github.com/kubernetes/kubernetes/issues/105830 | 1,032,987,512 | 105,830 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
I discovered... | Missing doc that static pod's spec can not reference any API objects | https://api.github.com/repos/kubernetes/kubernetes/issues/103167/comments | 8 | 2021-06-24T21:56:54Z | 2021-12-06T08:30:14Z | https://github.com/kubernetes/kubernetes/issues/103167 | 929,641,312 | 103,167 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
All versions are vulnerable to CVE-2021-33194
#### What you expected to happen:
Vulnerability to be mitigated
#### How to reproduce it (as minimally and precisely as possible):
go.mod needs to be updated to include
```
golang.org/x/net => golang.org/x/net v0.0.0-20210520170846-37e1c... | CVE-2021-33194: Update golang.org/x/net to v0.0.0-20210520170846-37e1c6afe023 | https://api.github.com/repos/kubernetes/kubernetes/issues/103166/comments | 4 | 2021-06-24T20:16:22Z | 2021-07-01T05:17:55Z | https://github.com/kubernetes/kubernetes/issues/103166 | 929,579,211 | 103,166 |
[
"kubernetes",
"kubernetes"
] | Follow up from:
https://github.com/kubernetes/kubernetes/pull/103123#issuecomment-867658560
- vendored dependencies (things in our tree we actually include code from
- direct dependencies (things one of our k8s.io/* components refers to directly)
cc @RinkiyaKeDad
| Update depstat to include new statistics | https://api.github.com/repos/kubernetes/kubernetes/issues/103157/comments | 3 | 2021-06-24T14:01:17Z | 2021-06-24T14:08:20Z | https://github.com/kubernetes/kubernetes/issues/103157 | 929,262,642 | 103,157 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
I would like to create and attach a RWO volume with vsphere csi driver. The PVC status is in pending state because the vsphere csi controller can't get the vm uuid node.
Vsphere csi controller log : failed to get shared datastores in kubernetes cluster. Error: Empty List of Node VMs returned from ... | vsphere csi controller fails to attach a volume due to empty providerId found in the cluster | https://api.github.com/repos/kubernetes/kubernetes/issues/103155/comments | 6 | 2021-06-24T12:23:24Z | 2021-11-21T13:46:59Z | https://github.com/kubernetes/kubernetes/issues/103155 | 929,174,172 | 103,155 |
[
"kubernetes",
"kubernetes"
] | Previously open issue : https://github.com/kubernetes/community/issues/5473
Twitter Discussion : https://twitter.com/BenTheElder/status/1407774856033181696
There's pros and cons to having a bot do this, let me try to enumerate current situation here:
- maintainers don't have to play bad cop
- keep set of open iss... | Auto-closing issues is harmful and causes friction | https://api.github.com/repos/kubernetes/kubernetes/issues/103151/comments | 32 | 2021-06-24T10:31:17Z | 2024-01-30T10:59:53Z | https://github.com/kubernetes/kubernetes/issues/103151 | 929,085,421 | 103,151 |
[
"kubernetes",
"kubernetes"
] | #### What would you like to be added:
Add an e2e test with a real SCTP scenario.
#### Why is this needed:
We are only testing basic SCTP functionality, i.e. my SCTP packet reaches the corresponding endpoint, however that has demonstrated to be insufficient.
We need to have and e2e test with a real SCTP scen... | Add a realistic e2e SCTP test | https://api.github.com/repos/kubernetes/kubernetes/issues/103150/comments | 19 | 2021-06-24T10:18:08Z | 2022-02-02T11:51:46Z | https://github.com/kubernetes/kubernetes/issues/103150 | 929,074,855 | 103,150 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
Hello,
Foun... | client-go: fixture data race | https://api.github.com/repos/kubernetes/kubernetes/issues/103148/comments | 5 | 2021-06-24T09:58:54Z | 2021-07-08T00:05:48Z | https://github.com/kubernetes/kubernetes/issues/103148 | 929,058,202 | 103,148 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
I have created an application that needs to have access to list, create, update and delete different Kubernetes resources and I created a clusterrole for it as below. Everything works fine on my local K8s cluster that runs on Microk8s but when I deployed it on a bare-metal cluster with the same ver... | Two Kubernetes clusters behave differently for the same RBAC | https://api.github.com/repos/kubernetes/kubernetes/issues/103147/comments | 4 | 2021-06-24T09:37:55Z | 2021-06-24T20:37:03Z | https://github.com/kubernetes/kubernetes/issues/103147 | 929,040,104 | 103,147 |
[
"kubernetes",
"kubernetes"
] | #### What would you like to be added:
I'd like the e2e framework to report some basic metrics for the kubernetes components during the tests.
> A summary of CPU and RAM consumption of the entire Prow test job (i.e. including all processes running inside KinD) amortized over time for the entire duration of the job... | e2e framework: monitoring and metrics report | https://api.github.com/repos/kubernetes/kubernetes/issues/103145/comments | 23 | 2021-06-24T08:41:11Z | 2024-04-03T00:40:13Z | https://github.com/kubernetes/kubernetes/issues/103145 | 928,990,335 | 103,145 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
The page htt... | Term `master` still exist in some script files | https://api.github.com/repos/kubernetes/kubernetes/issues/103144/comments | 8 | 2021-06-24T08:35:59Z | 2021-11-08T15:55:06Z | https://github.com/kubernetes/kubernetes/issues/103144 | 928,985,764 | 103,144 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
We have even e... | volumemanager could not process reconstructed volume‘s consistency while pvc volume delay adding to dsw while apiserver access unstabitily | https://api.github.com/repos/kubernetes/kubernetes/issues/103143/comments | 9 | 2021-06-24T07:42:47Z | 2021-07-19T22:04:53Z | https://github.com/kubernetes/kubernetes/issues/103143 | 928,942,292 | 103,143 |
[
"kubernetes",
"kubernetes"
] | #### What would you like to be added:
In our scenario, the resource usage is very low comparing to resource request; so we'd like to re-use those "idle" by other low priority task, e.g. batch. In this conext, we'd like to add a new interface/api on those oversubscription resources, and some improvement to kubelet on... | Support Oversubscription in kubernetes | https://api.github.com/repos/kubernetes/kubernetes/issues/103141/comments | 15 | 2021-06-24T07:15:06Z | 2021-11-22T23:56:18Z | https://github.com/kubernetes/kubernetes/issues/103141 | 928,922,630 | 103,141 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
After testing, the edge gateway is broken. Change to the same node name and ip to install node. Add to the k8s cluster. The docker container deployed on the original bad gateway will not be automatically deployed to the new gateway. Re-kubectl apply deployment .yaml(Specifies the deployment of node... | The problem of edge node replacement | https://api.github.com/repos/kubernetes/kubernetes/issues/103135/comments | 4 | 2021-06-24T03:20:53Z | 2021-06-25T01:23:24Z | https://github.com/kubernetes/kubernetes/issues/103135 | 928,808,771 | 103,135 |
[
"kubernetes",
"kubernetes"
] | See [KEP-2485](https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/2485-read-write-once-pod-pv-access-mode) for more context.
#### What would you like to be added:
The `ReadWriteOncePod` PVC access mode guarantees only a single pod can access the provided PVC as a volume. This is enforced duri... | Enforce ReadWriteOncePod PVC access mode during scheduling | https://api.github.com/repos/kubernetes/kubernetes/issues/103132/comments | 21 | 2021-06-24T01:13:17Z | 2023-02-13T19:45:34Z | https://github.com/kubernetes/kubernetes/issues/103132 | 928,758,940 | 103,132 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Using minReadySeconds in deployment yaml, this field is ignored when reporting pod readiness.
Even requests are sent to the pod before minReadySeconds.
Documentation claims minReadySeconds "_specifies the minimum number of seconds for which a newly created Pod should be ready without any of its c... | minReadySeconds does not work according to documentation | https://api.github.com/repos/kubernetes/kubernetes/issues/103121/comments | 8 | 2021-06-23T17:21:05Z | 2022-02-24T10:21:26Z | https://github.com/kubernetes/kubernetes/issues/103121 | 928,480,756 | 103,121 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
We have a k8s setup where we mirror all the public docker images to local and our cloud repository. We do this to avoid public repositories rate limiting and any other public outage cases.
As pause is a multi-arch image and we require this for both windows and linux workers, is there a way we co... | mirror pause image to local repository(AWS ECR) | https://api.github.com/repos/kubernetes/kubernetes/issues/103120/comments | 5 | 2021-06-23T16:58:17Z | 2021-06-24T08:56:42Z | https://github.com/kubernetes/kubernetes/issues/103120 | 928,463,720 | 103,120 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Using a CSI volume on a Linux machine with SELinux in enforcing mode. I noticed when the volume is used in a pod and the first NodePublishVolume for that pod fails (e.g. timeout), the volume does not get correct SELinux labels.
#### What you expected to happen:
The volume gets correct SELinux l... | CSI volume is not re-labeled when the first NodePublishVolume fails | https://api.github.com/repos/kubernetes/kubernetes/issues/103119/comments | 5 | 2021-06-23T16:28:30Z | 2021-06-24T21:18:05Z | https://github.com/kubernetes/kubernetes/issues/103119 | 928,440,521 | 103,119 |
[
"kubernetes",
"kubernetes"
] | <!-- Feature requests are unlikely to make progress as an issue.
Instead, please suggest enhancements by engaging with SIGs on slack and mailing lists.
A proposal that works through the design along with the implications of the change can be opened as a KEP:
https://git.k8s.io/enhancements/keps#kubernetes-enhanc... | Only allow specified users to access k8s cluster | https://api.github.com/repos/kubernetes/kubernetes/issues/103113/comments | 6 | 2021-06-23T10:53:44Z | 2021-07-29T02:46:54Z | https://github.com/kubernetes/kubernetes/issues/103113 | 928,126,945 | 103,113 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
I run kubead... | Failed to generate pod sandbox config if missing /etc/resolv.conf | https://api.github.com/repos/kubernetes/kubernetes/issues/103110/comments | 27 | 2021-06-23T10:16:18Z | 2022-01-10T05:37:33Z | https://github.com/kubernetes/kubernetes/issues/103110 | 928,096,182 | 103,110 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
Created a deployment and saw that validating webhook endpoint started serving. However, when trying to apply some resources to trigger validating webhook, it throws an error, as shown below, sometimes and after retrying a couple of times, it works.
Sometimes it throws an error `Internal error o... | ValidatingWebhook API sometimes throws connection refused and works after retry | https://api.github.com/repos/kubernetes/kubernetes/issues/103108/comments | 4 | 2021-06-23T09:47:27Z | 2021-07-15T20:11:19Z | https://github.com/kubernetes/kubernetes/issues/103108 | 928,069,384 | 103,108 |
[
"kubernetes",
"kubernetes"
] | <!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI -->
#### Which jobs are failing:
https://k8s-testgrid.appspot.com/sig-cluster-lifecycle-kubeadm#kubeadm-kinder-latest
#### Which test(s) are failing:
kubeadm-init
#### Since when has it been fa... | [failing test] kubeadm-kinder-latest: task-03-init | https://api.github.com/repos/kubernetes/kubernetes/issues/103101/comments | 4 | 2021-06-22T21:15:40Z | 2021-06-23T02:52:10Z | https://github.com/kubernetes/kubernetes/issues/103101 | 927,639,521 | 103,101 |
[
"kubernetes",
"kubernetes"
] | <!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI -->
#### Which jobs are failing:
ci-kubernetes-e2e-ubuntu-gce
#### Which test(s) are failing:
- Kubernetes e2e suite: AfterSuite
- e2e.go: Test
- e2e.go: Timeout
#### Since when has it b... | [Failing Test][sig-release] ci-kubernetes-e2e-ubuntu-gce | https://api.github.com/repos/kubernetes/kubernetes/issues/103097/comments | 5 | 2021-06-22T17:08:41Z | 2021-06-24T21:07:42Z | https://github.com/kubernetes/kubernetes/issues/103097 | 927,458,397 | 103,097 |
[
"kubernetes",
"kubernetes"
] | #### What would you like to be added:
Configure this repo ([k/kubernetes](https://github.com/kubernetes/kubernetes)) to retain LGTM labels when people squash commits. PR https://github.com/kubernetes/test-infra/pull/9138 made this possible.
#### Why is this needed:
This feature will make it easier for people to ... | Retain LGTM through squashes | https://api.github.com/repos/kubernetes/kubernetes/issues/103096/comments | 17 | 2021-06-22T16:44:16Z | 2022-12-17T00:57:53Z | https://github.com/kubernetes/kubernetes/issues/103096 | 927,439,066 | 103,096 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
when node in... | nodelifecycle: not compatible with virtual-kubelet node | https://api.github.com/repos/kubernetes/kubernetes/issues/103086/comments | 6 | 2021-06-22T07:32:48Z | 2021-06-23T07:15:26Z | https://github.com/kubernetes/kubernetes/issues/103086 | 926,924,130 | 103,086 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
Exclude node... | Azure Exclude node from LoadBalancer lead to failed reconciliation of services | https://api.github.com/repos/kubernetes/kubernetes/issues/103085/comments | 6 | 2021-06-22T07:27:28Z | 2021-07-14T03:14:52Z | https://github.com/kubernetes/kubernetes/issues/103085 | 926,920,159 | 103,085 |
[
"kubernetes",
"kubernetes"
] | <!-- Feature requests are unlikely to make progress as an issue.
Instead, please suggest enhancements by engaging with SIGs on slack and mailing lists.
A proposal that works through the design along with the implications of the change can be opened as a KEP:
https://git.k8s.io/enhancements/keps#kubernetes-enhanc... | Add Pod Schedule Score into ScheduleResult and put the scheduleResult into CycleState | https://api.github.com/repos/kubernetes/kubernetes/issues/103084/comments | 11 | 2021-06-22T07:25:52Z | 2021-12-23T10:34:54Z | https://github.com/kubernetes/kubernetes/issues/103084 | 926,918,979 | 103,084 |
[
"kubernetes",
"kubernetes"
] | Currently when we specify a deployment spec with hostNetwork is true and the application in a container listens to multiple ports, the hostPort should be assigned for each of those port.
ports:
- containerPort: 8090
hostPort: 8090
- containerPort: 8091
hostPort : 8091
It wou... | Support for 1:N mapping between hostPort and containerPort in Deployment Spec | https://api.github.com/repos/kubernetes/kubernetes/issues/103077/comments | 8 | 2021-06-22T03:14:15Z | 2021-11-22T19:55:27Z | https://github.com/kubernetes/kubernetes/issues/103077 | 926,782,971 | 103,077 |
[
"kubernetes",
"kubernetes"
] | ### Failure cluster [6bca1a441552b2cec1fe](https://go.k8s.io/triage#6bca1a441552b2cec1fe)
/cc @vteratipally
Can #101629 and npd v0.8.8(with https://github.com/kubernetes/node-problem-detector/pull/557) fix this problem?
/sig node
##### Error text:
```
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.... | Failure cluster : node_problem_detector Failed to read configuration file config/guestosconfig/known-modules.json | https://api.github.com/repos/kubernetes/kubernetes/issues/103075/comments | 3 | 2021-06-22T02:11:28Z | 2021-06-29T09:30:40Z | https://github.com/kubernetes/kubernetes/issues/103075 | 926,754,541 | 103,075 |
[
"kubernetes",
"kubernetes"
] | #### What happened:
This is a proactive issue opened to explore the path forward with the `purell` module that we have been using as a dependency for `kubeadm` in here https://github.com/kubernetes/kubernetes/blob/d6b408f74890abaa0b5be7172714c7fe89ee7eff/cmd/kubeadm/app/preflight/checks.go#L714
This module is lo... | purell module is no longer maintained | https://api.github.com/repos/kubernetes/kubernetes/issues/103068/comments | 15 | 2021-06-21T22:45:41Z | 2022-04-09T20:53:55Z | https://github.com/kubernetes/kubernetes/issues/103068 | 926,666,088 | 103,068 |
[
"kubernetes",
"kubernetes"
] | **Which jobs are flaking**:
`gce-master-scale-correctness (ci-kubernetes-e2e-gce-scale-correctness)`
**Which test(s) are flaking**:
`[sig-network] ESIPP [Slow] should work for type=NodePort`

**T... | [Flaky Test] [sig-network] ESIPP [Slow] should work for type=NodePort | https://api.github.com/repos/kubernetes/kubernetes/issues/103058/comments | 3 | 2021-06-21T16:21:22Z | 2021-06-23T01:28:38Z | https://github.com/kubernetes/kubernetes/issues/103058 | 926,389,866 | 103,058 |
[
"kubernetes",
"kubernetes"
] | ### Failure cluster [115e5f18964a60264cd9](https://go.k8s.io/triage#115e5f18964a60264cd9)
##### Error text:
```
_output/local/go/src/k8s.io/kubernetes/test/e2e_node/node_shutdown_linux_test.go:182
Unexpected error:
<*errors.errorString | 0xc0013984c0>: {
s: "failed to run \"sh -c systemctl restart d... | Failure cluster [115e5f18...]: test/e2e_node/node_shutdown_linux_test.go | https://api.github.com/repos/kubernetes/kubernetes/issues/103053/comments | 3 | 2021-06-21T14:15:39Z | 2021-06-29T18:19:51Z | https://github.com/kubernetes/kubernetes/issues/103053 | 926,265,327 | 103,053 |
[
"kubernetes",
"kubernetes"
] | Operating a managed Kubernetes service ([Gardener](https://gardener.cloud/)), we have observed problems due to under-reserving resources (OS OOM, processes CPU starved, ...) and would like to talk about a mechanism to more accurately set reserved resources based on actually available resources on the Node.
#### Wha... | More accurate kube-/system-reserved based on actual resource usage | https://api.github.com/repos/kubernetes/kubernetes/issues/103046/comments | 27 | 2021-06-21T10:48:29Z | 2022-12-05T15:06:05Z | https://github.com/kubernetes/kubernetes/issues/103046 | 926,086,643 | 103,046 |
[
"kubernetes",
"kubernetes"
] | We should be using Go native error wrapping (available since Go 1.13) (similar to what was done in https://github.com/containerd/console/pull/54)
NOTE : Please do not submit PRs for `cmd/kubeadm/app` though it is listed below.
code search : https://cs.k8s.io/?q=%22github.com%2Fpkg%2Ferrors%22&i=nope&files=&exclud... | Stop using github.com/pkg/errors | https://api.github.com/repos/kubernetes/kubernetes/issues/103043/comments | 44 | 2021-06-21T10:35:00Z | 2022-06-23T10:50:03Z | https://github.com/kubernetes/kubernetes/issues/103043 | 926,076,534 | 103,043 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
1. create ... | Unclear errors message when update pod spec | https://api.github.com/repos/kubernetes/kubernetes/issues/103034/comments | 9 | 2021-06-21T07:13:50Z | 2022-01-04T17:44:53Z | https://github.com/kubernetes/kubernetes/issues/103034 | 925,904,133 | 103,034 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
No enough di... | No enough disk space in the os disk but there is no alert in node's DiskPressure | https://api.github.com/repos/kubernetes/kubernetes/issues/103032/comments | 22 | 2021-06-21T03:49:37Z | 2023-05-04T16:58:46Z | https://github.com/kubernetes/kubernetes/issues/103032 | 925,793,427 | 103,032 |
[
"kubernetes",
"kubernetes"
] | <!-- Feature requests are unlikely to make progress as an issue.
Instead, please suggest enhancements by engaging with SIGs on slack and mailing lists.
A proposal that works through the design along with the implications of the change can be opened as a KEP:
https://git.k8s.io/enhancements/keps#kubernetes-enhanc... | Can I get the throughput with kubectl cp? | https://api.github.com/repos/kubernetes/kubernetes/issues/103020/comments | 9 | 2021-06-19T12:04:16Z | 2021-06-22T06:20:03Z | https://github.com/kubernetes/kubernetes/issues/103020 | 925,380,666 | 103,020 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
We have a ... | Upgrading from 1.18 to 1.19 may prevent csrapprover controller from starting | https://api.github.com/repos/kubernetes/kubernetes/issues/103017/comments | 14 | 2021-06-19T08:51:45Z | 2022-01-05T18:20:34Z | https://github.com/kubernetes/kubernetes/issues/103017 | 925,349,950 | 103,017 |
[
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
#### What happened:
We are devel... | Invalid value: "null" when field is removed from configuration and SSA is used to apply | https://api.github.com/repos/kubernetes/kubernetes/issues/103011/comments | 7 | 2021-06-19T00:18:57Z | 2023-04-18T08:53:17Z | https://github.com/kubernetes/kubernetes/issues/103011 | 925,274,761 | 103,011 |
[
"kubernetes",
"kubernetes"
] | <!-- Feature requests are unlikely to make progress as an issue.
Instead, please suggest enhancements by engaging with SIGs on slack and mailing lists.
A proposal that works through the design along with the implications of the change can be opened as a KEP:
https://git.k8s.io/enhancements/keps#kubernetes-enhanc... | Kubelet to validate container's resource limit | https://api.github.com/repos/kubernetes/kubernetes/issues/103009/comments | 20 | 2021-06-18T22:10:53Z | 2022-04-03T09:15:47Z | https://github.com/kubernetes/kubernetes/issues/103009 | 925,236,632 | 103,009 |
Subsets and Splits
Unique Owner-Repo Count
Counts the number of unique owner-repos in the dataset, providing a basic understanding of diverse repositories.