Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 1 - 10 of 121 for content_length:[500000 TO 999999] (0.04 sec)

  1. kube-apiserver Configuration (v1beta1) | Kubern...

    Package v1beta1 is the v1beta1 version of the API. Resource Types AuthenticationConfiguration AuthorizationConfiguration EgressSelectorConfiguration TracingConfiguration TracingConfiguration Appears in: KubeletConfiguration TracingConfiguration TracingConfiguration TracingConfiguration provides versioned configuration for OpenTelemetry tracing clients. FieldDescription endpoint string Endpoint of the collector this component will report traces to. The connection is insecure, and does not currently support TLS. Recommended is unset, and endpoint is the otlp grpc default, localhost:4317. samplingRatePerMillion int32 SamplingRatePerMillion is the number of samples to collect per million spans.
    kubernetes.io/docs/reference/config-api/apiserver-config.v1beta1/ Similar Results (1)
    Registered: Wed Sep 03 06:56:13 UTC 2025
    - 494K bytes
    - Viewed (0)
  2. Configure a Pod to Use a ConfigMap | Kubernetes

    Many applications rely on configuration which is used during either application initialization or runtime. Most times, there is a requirement to adjust values assigned to configuration parameters. ConfigMaps are a Kubernetes mechanism that let you inject configuration data into application pods. The ConfigMap concept allow you to decouple configuration artifacts from image content to keep containerized applications portable. For example, you can download and run the same container image to spin up containers for the purposes of local development, system test, or running a live end-user workload.
    kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/
    Registered: Wed Sep 03 06:11:45 UTC 2025
    - 563.2K bytes
    - Viewed (0)
  3. Restrict a Container's Syscalls with seccomp | ...

    FEATURE STATE: Kubernetes v1.19 [stable] Seccomp stands for secure computing mode and has been a feature of the Linux kernel since version 2.6.12. It can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Identifying the privileges required for your workloads can be difficult.
    kubernetes.io/docs/tutorials/security/seccomp/
    Registered: Wed Sep 03 06:34:42 UTC 2025
    - 517.4K bytes
    - Viewed (0)
  4. Logging Architecture | Kubernetes

    Application logs can help you understand what is happening inside your application. The logs are particularly useful for debugging problems and monitoring cluster activity. Most modern applications have some kind of logging mechanism. Likewise, container engines are designed to support logging. The easiest and most adopted logging method for containerized applications is writing to standard output and standard error streams. However, the native functionality provided by a container engine or runtime is usually not enough for a complete logging solution.
    kubernetes.io/docs/concepts/cluster-administration/logging/
    Registered: Wed Sep 03 06:09:54 UTC 2025
    - 508K bytes
    - Viewed (0)
  5. Authorization | Kubernetes

    Details of Kubernetes authorization mechanisms and supported authorization modes.
    kubernetes.io/docs/reference/access-authn-authz/authorization/
    Registered: Wed Sep 03 06:25:56 UTC 2025
    - 503.4K bytes
    - Viewed (0)
  6. Ingress | Kubernetes

    Make your HTTP (or HTTPS) network service available using a protocol-aware configuration mechanism, that understands web concepts like URIs, hostnames, paths, and more. The Ingress concept lets you map traffic to different backends based on rules you define via the Kubernetes API.
    kubernetes.io/docs/concepts/services-networking/ingress/
    Registered: Wed Sep 03 05:56:47 UTC 2025
    - 547K bytes
    - Viewed (0)
  7. Managing Workloads | Kubernetes

    You've deployed your application and exposed it via a Service. Now what? Kubernetes provides a number of tools to help you manage your application deployment, including scaling and updating. Organizing resource configurations Many applications require multiple resources to be created, such as a Deployment along with a Service. Management of multiple resources can be simplified by grouping them together in the same file (separated by --- in YAML). For example:
    kubernetes.io/docs/concepts/workloads/management/
    Registered: Wed Sep 03 05:57:44 UTC 2025
    - 490K bytes
    - Viewed (0)
  8. Images | Kubernetes

    A container image represents binary data that encapsulates an application and all its software dependencies. Container images are executable software bundles that can run standalone and that make very well-defined assumptions about their runtime environment. You typically create a container image of your application and push it to a registry before referring to it in a Pod. This page provides an outline of the container image concept. Note:If you are looking for the container images for a Kubernetes release (such as v1.
    kubernetes.io/docs/concepts/containers/images/
    Registered: Wed Sep 03 05:57:48 UTC 2025
    - 494K bytes
    - Viewed (0)
  9. Jobs | Kubernetes

    Jobs represent one-off tasks that run to completion and then stop.
    kubernetes.io/docs/concepts/workloads/controllers/job/
    Registered: Wed Sep 03 05:59:17 UTC 2025
    - 569.8K bytes
    - Viewed (0)
  10. Deployments | Kubernetes

    A Deployment manages a set of Pods to run an application workload, usually one that doesn't maintain state.
    kubernetes.io/docs/concepts/workloads/controllers/deployment/
    Registered: Wed Sep 03 05:59:01 UTC 2025
    - 549.4K bytes
    - Viewed (0)
Back to top