{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":275098856,"defaultBranch":"master","name":"kubernetes","ownerLogin":"dgrisonnet","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2020-06-26T07:31:51.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/22327577?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1714061577.0","currentOid":""},"activityList":{"items":[{"before":"36b3fe4ed5dacb0806c629d9d3b6f46db267ae14","after":"3d76a1e3cac21522b27ca17c2581dd3aafc8f9b0","ref":"refs/heads/disable-pnf","pushedAt":"2024-04-25T16:15:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"Disable P&F by default for aggregated apiservers\n\nPriority and Fairness is currently enabled by default for any consumers\nof the apiserver library. This include the kube-apiserver as well as\naggregated apiservers that are based on the generic apiserver library.\nFor the latter it doesn't really make sense to have P&F enabled by\ndefault because the apiservers are for the majority not supposed to be\naccessed directly, but rather via the kube-apiserver. In case there is\nstill a need to enable P&F at an aggregated apiserver level, they can\ncontinue to do it either via the `--enable-priority-and-fairness` CLI\nflag or by turning on the feature like we do for the kube-apiserver.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"Disable P&F by default for aggregated apiservers"}},{"before":null,"after":"36b3fe4ed5dacb0806c629d9d3b6f46db267ae14","ref":"refs/heads/disable-pnf","pushedAt":"2024-04-25T16:12:57.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"Disable P&F by default for aggregated apiservers\n\nPriority and Fairness is currently enabled by default for any consumers\nof the apiserver library. This include the kube-apiserver as well as\naggregated apiservers that are based on the generic apiserver library.\nFor the latter it doesn't really make sense to have P&F enabled by\ndefault because the apiservers are for the majority not supposed to be\naccessed directly, but rather via the kube-apiserver. In case there is\nstill a need to enable P&F at an aggregated apiserver level, they can\ncontinue to do it either via the `--enable-priority-and-fairness` CLI\nflag or by turning on the feature like we do for the kube-apiserver.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"Disable P&F by default for aggregated apiservers"}},{"before":"ec22b2214db0c69dc4872362aeceff0a731ed35e","after":"547ff5b8c12e9ea88d692161775a9a1243b62ec5","ref":"refs/heads/enable-http2-mitigation-release-4.15","pushedAt":"2023-11-02T14:11:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"UPSTREAM: : Enable UnauthenticatedHTTP2DOSMitigation by default\n\nEnable the UnauthenticatedHTTP2DOSMitigation feature gate by default to\nmitigate the HTTP/2 CVE across all our components.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"UPSTREAM: <carry>: Enable UnauthenticatedHTTP2DOSMitigation by default"}},{"before":"547ff5b8c12e9ea88d692161775a9a1243b62ec5","after":"ec22b2214db0c69dc4872362aeceff0a731ed35e","ref":"refs/heads/enable-http2-mitigation-release-4.15","pushedAt":"2023-10-26T15:00:51.000Z","pushType":"push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":"81381f87754c721280f58423f684928a09cec55d","after":"a8a1abc25cad87333840cd7d54be2efaf31a3177","ref":"refs/heads/openshift-apiserver-4.15-kubernetes-1.28.3","pushedAt":"2023-10-26T14:58:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"Release commit for Kubernetes v1.28.3","shortMessageHtmlLink":"Release commit for Kubernetes v1.28.3"}},{"before":null,"after":"81381f87754c721280f58423f684928a09cec55d","ref":"refs/heads/openshift-apiserver-4.15-kubernetes-1.28.3","pushedAt":"2023-10-26T14:57:53.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":null,"after":"c945a2ecf16973bb85532e3d95ca06e2887c8d71","ref":"refs/heads/enable-http2-mitigation-release-4.12","pushedAt":"2023-10-26T12:20:03.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"UPSTREAM: : Enable UnauthenticatedHTTP2DOSMitigation by default\n\nEnable the UnauthenticatedHTTP2DOSMitigation feature gate by default to\nmitigate the HTTP/2 CVE across all our components.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"UPSTREAM: <carry>: Enable UnauthenticatedHTTP2DOSMitigation by default"}},{"before":null,"after":"38cde3b9a6f339c1760068c7f830d894867cd9af","ref":"refs/heads/enable-http2-mitigation-release-4.13","pushedAt":"2023-10-26T12:19:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"UPSTREAM: : Enable UnauthenticatedHTTP2DOSMitigation by default\n\nEnable the UnauthenticatedHTTP2DOSMitigation feature gate by default to\nmitigate the HTTP/2 CVE across all our components.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"UPSTREAM: <carry>: Enable UnauthenticatedHTTP2DOSMitigation by default"}},{"before":null,"after":"60bd75aef032bc68239b9b07daa12ba28c9ce2e2","ref":"refs/heads/enable-http2-mitigation-release-4.14","pushedAt":"2023-10-26T12:19:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"UPSTREAM: : Enable UnauthenticatedHTTP2DOSMitigation by default\n\nEnable the UnauthenticatedHTTP2DOSMitigation feature gate by default to\nmitigate the HTTP/2 CVE across all our components.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"UPSTREAM: <carry>: Enable UnauthenticatedHTTP2DOSMitigation by default"}},{"before":null,"after":"547ff5b8c12e9ea88d692161775a9a1243b62ec5","ref":"refs/heads/enable-http2-mitigation-release-4.15","pushedAt":"2023-10-26T12:18:06.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"UPSTREAM: : Enable UnauthenticatedHTTP2DOSMitigation by default\n\nEnable the UnauthenticatedHTTP2DOSMitigation feature gate by default to\nmitigate the HTTP/2 CVE across all our components.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"UPSTREAM: <carry>: Enable UnauthenticatedHTTP2DOSMitigation by default"}},{"before":null,"after":"547ff5b8c12e9ea88d692161775a9a1243b62ec5","ref":"refs/heads/carry-121196-release-4.15","pushedAt":"2023-10-26T12:16:44.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"UPSTREAM: : Enable UnauthenticatedHTTP2DOSMitigation by default\n\nEnable the UnauthenticatedHTTP2DOSMitigation feature gate by default to\nmitigate the HTTP/2 CVE across all our components.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"UPSTREAM: <carry>: Enable UnauthenticatedHTTP2DOSMitigation by default"}},{"before":"18c3c7efb3bcccd84cccc7dacc01f0a7427b8eb9","after":"7f74663c2e0cdbeef272cf80dddb19e5cccbeb94","ref":"refs/heads/investigate-OCPBUGS-3850","pushedAt":"2023-09-13T14:40:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"Add log to deprecated requests monitored\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"Add log to deprecated requests monitored"}},{"before":null,"after":"18c3c7efb3bcccd84cccc7dacc01f0a7427b8eb9","ref":"refs/heads/investigate-OCPBUGS-3850","pushedAt":"2023-09-13T14:38:30.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"Merge pull request #119867 from pohly/kube-proxy-verbosity\n\nkube-proxy: fix combination of --config and logging command line flags","shortMessageHtmlLink":"Merge pull request kubernetes#119867 from pohly/kube-proxy-verbosity"}},{"before":null,"after":"08006c842fd6a584bb8e2511587c999ffe7ced9d","ref":"refs/heads/body-size","pushedAt":"2023-09-07T17:23:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"apiserver: rename request body size metric\n\nRename the apiserver_request_body_sizes metric to\napiserver_request_body_size_bytes to conform with Prometheus best\npractices.\n\nThis can be done safely without deprecation because that metric wasn't\nregistered before.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"apiserver: rename request body size metric"}},{"before":null,"after":"be5de087403dfeaa3cc86db806570b29686aa52b","ref":"refs/heads/enable-openmetrics","pushedAt":"2023-08-17T19:00:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"component-base/metrics: enable openmetrics\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"component-base/metrics: enable openmetrics"}},{"before":"05c76f6be941fc84932c963a8f645d71fe69ad57","after":"c6efaf16c1ed07ce37485b7a272628f653cbf06f","ref":"refs/heads/panic-storage-metric","pushedAt":"2023-08-10T15:36:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"apiserver/etcd3: fix segv during metric collection\n\nFix a segfault when collecting the storage size metrics when the getters\nused to collect the data on etcd haven't been initialized properly. This\nhappens when the EtcdOptions are not applied which is the case for\naggregated apiservers that don't care about storage.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"apiserver/etcd3: fix segv during metric collection"}},{"before":null,"after":"05c76f6be941fc84932c963a8f645d71fe69ad57","ref":"refs/heads/panic-storage-metric","pushedAt":"2023-08-10T15:26:59.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":"faedf64aa2f93b6b0e0492f473347696adaf7bd6","after":"3fd40ffb0ef220524eaef941eb3842d1968dc715","ref":"refs/heads/metrics-server-nanny","pushedAt":"2023-07-18T08:42:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"addons/metrics-server: fix nanny rbac permissions\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"addons/metrics-server: fix nanny rbac permissions"}},{"before":"94ae7e27e0f0b4c015ebef0f566f2fa1aeb9e2b2","after":"faedf64aa2f93b6b0e0492f473347696adaf7bd6","ref":"refs/heads/metrics-server-nanny","pushedAt":"2023-07-18T06:26:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":"5a73eaa28c03ef78a84eb8846d76c19084c3508e","after":"94ae7e27e0f0b4c015ebef0f566f2fa1aeb9e2b2","ref":"refs/heads/metrics-server-nanny","pushedAt":"2023-07-18T06:20:06.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":null,"after":"5a73eaa28c03ef78a84eb8846d76c19084c3508e","ref":"refs/heads/metrics-server-nanny","pushedAt":"2023-07-17T20:06:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":null,"after":"11716b1267daed5e50a52a987492827b2083c052","ref":"refs/heads/automated-cherry-pick-of-#114237-#114236-#112334-upstream-release-1.25","pushedAt":"2023-07-17T14:38:44.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"events: fix EventSeries starting count discrepancy\n\nThe kube-apiserver validation expects the Count of an EventSeries to be\nat least 2, otherwise it rejects the Event. There was is discrepancy\nbetween the client and the server since the client was iniatizing an\nEventSeries to a count of 1.\n\nAccording to the original KEP, the first event emitted should have an\nEventSeries set to nil and the second isomorphic event should have an\nEventSeries with a count of 2. Thus, we should matcht the behavior\ndefine by the KEP and update the client.\n\nAlso, as an effort to make the old clients compatible with the servers,\nwe should allow Events with an EventSeries count of 1 to prevent any\nunexpected rejections.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"events: fix EventSeries starting count discrepancy"}},{"before":null,"after":"62c9fa8fe6c2e04b1a40970e93055c2e92259b12","ref":"refs/heads/automated-cherry-pick-of-#114237-#114236-#112334-upstream-release-1.26","pushedAt":"2023-07-17T14:38:11.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"events: fix EventSeries starting count discrepancy\n\nThe kube-apiserver validation expects the Count of an EventSeries to be\nat least 2, otherwise it rejects the Event. There was is discrepancy\nbetween the client and the server since the client was iniatizing an\nEventSeries to a count of 1.\n\nAccording to the original KEP, the first event emitted should have an\nEventSeries set to nil and the second isomorphic event should have an\nEventSeries with a count of 2. Thus, we should matcht the behavior\ndefine by the KEP and update the client.\n\nAlso, as an effort to make the old clients compatible with the servers,\nwe should allow Events with an EventSeries count of 1 to prevent any\nunexpected rejections.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"events: fix EventSeries starting count discrepancy"}},{"before":null,"after":"0ba169bb1652bfca9e2d60d5713ccb5491791ee1","ref":"refs/heads/automated-cherry-pick-of-#112334-upstream-release-1.26","pushedAt":"2023-07-17T13:47:15.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"events: fix EventSeries starting count discrepancy\n\nThe kube-apiserver validation expects the Count of an EventSeries to be\nat least 2, otherwise it rejects the Event. There was is discrepancy\nbetween the client and the server since the client was iniatizing an\nEventSeries to a count of 1.\n\nAccording to the original KEP, the first event emitted should have an\nEventSeries set to nil and the second isomorphic event should have an\nEventSeries with a count of 2. Thus, we should matcht the behavior\ndefine by the KEP and update the client.\n\nAlso, as an effort to make the old clients compatible with the servers,\nwe should allow Events with an EventSeries count of 1 to prevent any\nunexpected rejections.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"events: fix EventSeries starting count discrepancy"}},{"before":null,"after":"08a324bf51238183f4ed3f7f875d8ef9e832c44f","ref":"refs/heads/ms-15s-resolution","pushedAt":"2023-04-05T18:10:50.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"cluster/addons: set metrics-resolution to 15s\n\nAlign metrics-server metrics-resolution with the upstream manifests so\nthat scalability tests are running a similar configuration of\nmetrics-server as the one we are running in the e2e tests.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"cluster/addons: set metrics-resolution to 15s"}},{"before":"30fd52ef79018005d6deb7722f015c99df39f348","after":"eba18d503cc6aa831ac914677af163dceb779782","ref":"refs/heads/bump-ms-0.6.3","pushedAt":"2023-04-05T18:08:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"cluster/addons: bump metrics-server to v0.6.3\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"cluster/addons: bump metrics-server to v0.6.3"}},{"before":null,"after":"30fd52ef79018005d6deb7722f015c99df39f348","ref":"refs/heads/bump-ms-0.6.3","pushedAt":"2023-04-05T18:03:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"}},{"before":"f564bcf8945616aec9d0b5b93954fdb1a1479d9c","after":"ac394c5c192b8c3f3007473e5a44cccf6aac74d6","ref":"refs/heads/cleanup-deprecated-metrics","pushedAt":"2023-03-13T21:58:16.265Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"Cleanup deprecated metrics\n\nRemove the following deprecated metrics:\n- node_collector_evictions_number\n- scheduler_e2e_scheduling_duration_seconds\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"Cleanup deprecated metrics"}},{"before":"a12bd72280ebd30c76aeac9e43c2792ffbea5355","after":"d00364902bda05eed4f7f02051ab81f7be55f8a9","ref":"refs/heads/fix-eventseries-count","pushedAt":"2023-03-13T12:33:07.191Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"events: fix EventSeries starting count discrepancy\n\nThe kube-apiserver validation expects the Count of an EventSeries to be\nat least 2, otherwise it rejects the Event. There was is discrepancy\nbetween the client and the server since the client was iniatizing an\nEventSeries to a count of 1.\n\nAccording to the original KEP, the first event emitted should have an\nEventSeries set to nil and the second isomorphic event should have an\nEventSeries with a count of 2. Thus, we should matcht the behavior\ndefine by the KEP and update the client.\n\nAlso, as an effort to make the old clients compatible with the servers,\nwe should allow Events with an EventSeries count of 1 to prevent any\nunexpected rejections.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"events: fix EventSeries starting count discrepancy"}},{"before":"bb8875149d1d9b7434efcc8e8eb69171ed72f04e","after":"1efa1a65ee26c68de3f972f4e079338889a3e5e9","ref":"refs/heads/pod-logs-metrics","pushedAt":"2023-03-10T16:46:31.761Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"dgrisonnet","name":"Damien Grisonnet","path":"/dgrisonnet","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/22327577?s=80&v=4"},"commit":{"message":"pkg/registry: rename pod logs metrics\n\nThe pod_logs subsystem was inadvertently made redundant in the following\nkube-apiserver metrics:\n- kube_apiserver_pod_logs_pods_logs_backend_tls_failure_total\n- kube_apiserver_pod_logs_pods_logs_insecure_backend_total\n\nTo safely rename them, it is required to deprecate them in 1.27 whilst\nintroducing the new metrics replacing them.\n\nSigned-off-by: Damien Grisonnet ","shortMessageHtmlLink":"pkg/registry: rename pod logs metrics"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEOl4y2gA","startCursor":null,"endCursor":null}},"title":"Activity ยท dgrisonnet/kubernetes"}