Michel Loiseleur

Results 57 issues of Michel Loiseleur

# Description Update external-dns maintainers. Motivation detailed in https://github.com/kubernetes-sigs/external-dns/pull/4679

cncf-cla: yes
size/XS
approved
area/artifacts
sig/k8s-infra
area/registry.k8s.io

### What does this PR do? It adds a section with checklist and examples on how Certificates of Cert Manager can be used with Traefik Proxy. ### Motivation I needed...

kind/enhancement
area/documentation
status/2-needs-review
size/M

### Welcome! - [X] Yes, I've searched similar issues on [GitHub](https://github.com/traefik/traefik/issues) and didn't find any. - [X] Yes, I've searched similar issues on the [Traefik community forum](https://community.traefik.io) and didn't find...

kind/enhancement
priority/P3
area/cli
contributor/wanted

### What does this PR do? Replace v1.1.0 CRD with v1.2.0 ### Motivation Traefik Proxy v3.2 support Gateway API v1.2.0. It deploys standard channel by default. ### More - [...

kind/enhancement

### What does this PR do? Update current CRD with the ones used with Traefik Proxy v3.2 ### Motivation They have been updated upstream.

kind/enhancement

### Description This PR is based on https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/3575 It tries to follow @oliviassss [suggestion](https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/3575#discussion_r1612099488) By default, it changes nothing. When it is set, it will disable it at `ServiceAccount` level...

cncf-cla: yes
size/S

/kind feature **Describe the solution you'd like** This provider uses the _in-tree_ gce cloud provider integration with kubelet (`--cloud-provider=gce`). It has been [deprecated in Kubernetes v1.29](https://kubernetes.io/blog/2023/12/13/kubernetes-v1-29-release/#deprecations-and-removals) and will eventually be...

kind/feature

**What type of PR is this?** /kind bug **What this PR does / why we need it**: Related to #1331 **Special notes for your reviewer**: Since we did not manage...

kind/bug
release-note
cncf-cla: yes
size/XS

# Motivation By disabling it on ServiceAccount level and enabling it individually on pod level, security scanner expects it's more secure. See for instance [C-0034](https://hub.armosec.io/docs/c-0034) from kubescape scanner or [this...

# Motivation 1. More flexibility 2. Some security scanners require one to be set explicitely