-
Notifications
You must be signed in to change notification settings - Fork 658
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
REQUEST: New membership for hanlins #2505
Comments
+1 @hanlins did an awesome job on kubernetes/kubernetes#95727 and has made contributions to Kubernetes community across sig-node and sig-network. |
+1 !!!! |
@hanlins Sponsors need to be in an OWNERS file in the @kubernetes org. Unfortunately, due to this restriction, @bobbypage would not be able to sponsor. Can you add an additional non-VMware sponsor who fits this criteria? |
+1 |
@hanlins sponsorships look good, you should get added to the github orgs when the next batch of membership requests are processed! 😄 |
@hanlins thank you for all your contributions so far \o/ I've created PR #2513 to add you to the Kubernetes and Kubernetes SIGs Org. Once that gets merged, you should get a membership invite notification. Welcome to @kubernetes and @kubernetes-sigs! 🎉 /assign |
Thanks for all the supports from @bobbypage @andrewsykim @aojea and @nikhita, really appreciate it! |
GitHub Username
@hanlins
Organization you are requesting membership in
@kubernetes
@kubernetes-sigs
Requirements
Sponsors
List of contributions to the Kubernetes project
vendor: update cAdvisor to v0.38.6 kubernetes#97174
vendor: update cAdvisor to v0.38.6 kubernetes#97175
vendor: update cAdvisor to v0.37.3 kubernetes#97176
Explicitly add iptables rule to allow healthcheck nodeport kubernetes#97824
Add iptables rules to allow nodeport traffic in ipvs mode kubernetes#98816
healthCheckNodePort depends on the default iptables chain policy to be accessible externally kubernetes#97225
NodePort service in ipvs mode depends on INPUT chain policy to be accessible externally kubernetes#98465
kubernetes pod-to-pod low bandwidth kubernetes#95860
The cpu of kubelet is always 100% after containerd.service restart kubernetes#95727
Http proxy support for egress traffic kubernetes-sigs/cluster-api#3751
sig-node
sig-network
The text was updated successfully, but these errors were encountered: