Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 1 - 10 of 593 for content_length:[100000 TO 499999] (0.02 sec)

  1. Field Selectors | Kubernetes

    Field selectors let you select Kubernetes objects based on the value of one or more resource fields. Here are some examples of field selector queries: metadata.name=my-service metadata.namespace!=default status.phase=Pending This kubectl command selects all Pods for which the value of the status.phase field is Running: kubectl get pods --field-selector status.phase=Running Note:Field selectors are essentially resource filters. By default, no selectors/filters are applied, meaning that all resources of the specified type are selected.
    kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/
    Registered: Fri Aug 15 06:24:41 UTC 2025
    - 460.8K bytes
    - Viewed (0)
  2. Object Names and IDs | Kubernetes

    Each object in your cluster has a Name that is unique for that type of resource. Every Kubernetes object also has a UID that is unique across your whole cluster. For example, you can only have one Pod named myapp-1234 within the same namespace, but you can have one Pod and one Deployment that are each named myapp-1234. For non-unique user-provided attributes, Kubernetes provides labels and annotations. Names A client-provided string that refers to an object in a resource URL, such as /api/v1/pods/some-name.
    kubernetes.io/docs/concepts/overview/working-with-objects/names/
    Registered: Fri Aug 15 06:24:37 UTC 2025
    - 460.7K bytes
    - Viewed (0)
  3. Overview | Kubernetes

    Kubernetes is a portable, extensible, open source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available.
    kubernetes.io/docs/concepts/overview/
    Registered: Fri Aug 15 06:24:29 UTC 2025
    - 462.8K bytes
    - Viewed (0)
  4. PKI certificates and requirements | Kubernetes

    Kubernetes requires PKI certificates for authentication over TLS. If you install Kubernetes with kubeadm, the certificates that your cluster requires are automatically generated. You can also generate your own certificates -- for example, to keep your private keys more secure by not storing them on the API server. This page explains the certificates that your cluster requires. How certificates are used by your cluster Kubernetes requires PKI for the following operations:
    kubernetes.io/docs/setup/best-practices/certificates/
    Registered: Fri Aug 15 06:27:00 UTC 2025
    - 469.1K bytes
    - Viewed (0)
  5. Container Runtimes | Kubernetes

    Note: Dockershim has been removed from the Kubernetes project as of release 1.24. Read the Dockershim Removal FAQ for further details. You need to install a container runtime into each node in the cluster so that Pods can run there. This page outlines what is involved and describes related tasks for setting up nodes. Kubernetes 1.33 requires that you use a runtime that conforms with the Container Runtime Interface (CRI).
    kubernetes.io/docs/setup/production-environment/container-runtimes/
    Registered: Fri Aug 15 06:28:03 UTC 2025
    - 474.1K bytes
    - Viewed (0)
  6. Scheduler Performance Tuning | Kubernetes

    FEATURE STATE: Kubernetes v1.14 [beta] kube-scheduler is the Kubernetes default scheduler. It is responsible for placement of Pods on Nodes in a cluster. Nodes in a cluster that meet the scheduling requirements of a Pod are called feasible Nodes for the Pod. The scheduler finds feasible Nodes for a Pod and then runs a set of functions to score the feasible Nodes, picking a Node with the highest score among the feasible ones to run the Pod.
    kubernetes.io/docs/concepts/scheduling-eviction/scheduler-perf-tuning/
    Registered: Fri Aug 15 06:43:03 UTC 2025
    - 460.8K bytes
    - Viewed (0)
  7. Changing The Kubernetes Package Repository | Ku...

    This page explains how to enable a package repository for the desired Kubernetes minor release upon upgrading a cluster. This is only needed for users of the community-owned package repositories hosted at pkgs.k8s.io. Unlike the legacy package repositories, the community-owned package repositories are structured in a way that there's a dedicated package repository for each Kubernetes minor version. Note:This guide only covers a part of the Kubernetes upgrade process. Please see the upgrade guide for more information about upgrading Kubernetes clusters.
    kubernetes.io/docs/tasks/administer-cluster/kubeadm/change-package-repository/
    Registered: Fri Aug 15 06:43:39 UTC 2025
    - 463.1K bytes
    - Viewed (0)
  8. Find Out What Container Runtime is Used on a No...

    This page outlines steps to find out what container runtime the nodes in your cluster use. Depending on the way you run your cluster, the container runtime for the nodes may have been pre-configured or you need to configure it. If you're using a managed Kubernetes service, there might be vendor-specific ways to check what container runtime is configured for the nodes. The method described on this page should work whenever the execution of kubectl is allowed.
    kubernetes.io/docs/tasks/administer-cluster/migrating-from-dockershim/find-out-runtime-you-use/
    Registered: Fri Aug 15 06:42:43 UTC 2025
    - 457.1K bytes
    - Viewed (0)
  9. Production environment | Kubernetes

    Create a production-quality Kubernetes cluster
    kubernetes.io/docs/setup/production-environment/
    Registered: Fri Aug 15 06:26:39 UTC 2025
    - 470.9K bytes
    - Viewed (0)
  10. Enforcing Pod Security Standards | Kubernetes

    This page provides an overview of best practices when it comes to enforcing Pod Security Standards. Using the built-in Pod Security Admission Controller FEATURE STATE: Kubernetes v1.25 [stable] The Pod Security Admission Controller intends to replace the deprecated PodSecurityPolicies. Configure all cluster namespaces Namespaces that lack any configuration at all should be considered significant gaps in your cluster security model. We recommend taking the time to analyze the types of workloads occurring in each namespace, and by referencing the Pod Security Standards, decide on an appropriate level for each of them.
    kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/
    Registered: Fri Aug 15 06:26:16 UTC 2025
    - 458.7K bytes
    - Viewed (0)
Back to top